Advanced Search
Search Results
50 total results found
Introduction & Concepts
What's New in Domain 8? 8.2 Identify and Apply Security Controls in Software Development Ecosystems Programming Concepts: Programming languages Libraries Tool sets Integrated Development Environment (IDE) Runtime Code repositories Continuous Int...
Database Concepts and Threats
RDBMS Architecture Tables (relations): Comprises multiple attributes or fields. Each attribute corresponds to a column in the table. Rows (records/tuples): A singular data record in a table. Each row, representing a specific item data, holds varying data but...
Machine Learning and Artificial Intelligence
Introduction to Machine Learning Machine Learning Techniques Focus on algorithmically discovering knowledge from datasets. Aids in deriving insights and patterns from vast data. Expert Systems Comprises two main components: Knowledge Base: Conta...
Software Development Concepts
SDLC Phase Steps Phase Name Description Mnemonic ⬇️ Requirements and Analysis In this phase, the needs of potential users are understood and analyzed to produce a requirements specification. Real ⬇️ Design This phase involves creating...
Software Security and Threats
Change, Configuration, and Testing Change and Configuration Management Provides an organized framework. Enables cost/benefit analysis. Request Control - Enables users to request modifications. Change Control - Used to recreate and analyze situations...
Systems Security Concepts
Protection Rings: Protection rings structure privilege levels in a hierarchical manner, typically visualized as concentric rings. The innermost ring (Ring 0) has the most privileges, and as you move outward, privileges decrease. Ring 0 (Kernel Mode): The...
Types of Attacks
In the realm of cybersecurity, we often encounter various types of attacks. We'll dig deeper into each of these attacks, providing a detailed breakdown of their mechanisms. But for now, let's look at the most comprehensive attacks, and explore other complex at...
Types of Law
Type of Law Standard Description Criminal Law Beyond a reasonable doubt Contains prohibitions against actions like murder, assault, and robbery. Can lead to jailtime. Civil Law Preponderance of evidence Addresses contractual disputes...
Identity, Access Management
Key Term Description Examples Subject Active participant that requests access. Users, processes, organizations. Object Passive participant that responds to an access request. Files, printers, users, processes, orgs. Access Relat...
Exam 2
1, add if you have time 10. The separation of network infrastructure from the control layer, combined with the ability to centrally program a network design in a vendor-neutral, standards-based implementation, is an example of what important concept? A. ...