O'Reilly logo

CISSP Exam Cram™ 2 by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Applications and Systems-Development Security

Terms you'll need to understand:

  • Tuple

  • Polyinstantiation

  • Inference

  • Certification

  • Accreditation

  • Database

  • Malware

  • Buffer overflow

Techniques you'll need to master:

  • Identifying the system development life cycle

  • Understanding database design

  • Stating the steps of the development life cycle

  • Recognizing the different types of failure states

  • Recognizing the four primary types of databases

Introduction

Well-written applications are the key to good security. As such, this chapter focuses on the security requirements that are needed when developing applications. Although this chapter won't make you into a programmer, it will help you understand the steps required to build robust and secure applications.

To become certified ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required