8-62.3 Secure Coding Practices Flashcards

1
Q

The process used to anticipate threats

A

Threat Modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Allow only the minimum levels of access necessary to perform tasks or functions

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptographic method to confirm authenticity and integrity

A

Code signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Property that describes an applications ability to withstand attack

A

Survivability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

All of the points where an attacker can try to enter or extract dats

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly