Chapter 7. Applications and Systems-Development Security

Terms you'll need to understand:

  • Tuple

  • Polyinstantiation

  • Inference

  • Certification

  • Accreditation

  • Database

  • Malware

  • Buffer overflow

Techniques you'll need to master:

  • Identifying the system development life cycle

  • Understanding database design

  • Stating the steps of the development life cycle

  • Recognizing the different types of failure states

  • Recognizing the four primary types of databases

Introduction

Well-written applications are the key to good security. As such, this chapter focuses on the security requirements that are needed when developing applications. Although this chapter won't make you into a programmer, it will help you understand the steps required to build robust and secure applications.

To become certified ...

Get CISSP Exam Cram™ 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.