Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

50 total results found

Introduction & Concepts

CISSP Study Guide 8: Software Development Security

What's New in Domain 8? 8.2 Identify and Apply Security Controls in Software Development Ecosystems Programming Concepts: Programming languages Libraries Tool sets Integrated Development Environment (IDE) Runtime Code repositories Continuous Int...

Database Concepts and Threats

CISSP Study Guide 8: Software Development Security

RDBMS Architecture Tables (relations): Comprises multiple attributes or fields. Each attribute corresponds to a column in the table. Rows (records/tuples): A singular data record in a table. Each row, representing a specific item data, holds varying data but...

Machine Learning and Artificial Intelligence

CISSP Study Guide 8: Software Development Security

Introduction to Machine Learning Machine Learning Techniques Focus on algorithmically discovering knowledge from datasets. Aids in deriving insights and patterns from vast data. Expert Systems Comprises two main components: Knowledge Base: Conta...

Software Development Concepts

CISSP Study Guide 8: Software Development Security

SDLC Phase Steps Phase Name Description Mnemonic ⬇️ Requirements and Analysis In this phase, the needs of potential users are understood and analyzed to produce a requirements specification. Real ⬇️ Design This phase involves creating...

Software Security and Threats

CISSP Study Guide 8: Software Development Security

Change, Configuration, and Testing Change and Configuration Management Provides an organized framework. Enables cost/benefit analysis. Request Control - Enables users to request modifications. Change Control - Used to recreate and analyze situations...

Systems Security Concepts

CISSP Study Guide 8: Software Development Security

Protection Rings: Protection rings structure privilege levels in a hierarchical manner, typically visualized as concentric rings. The innermost ring (Ring 0) has the most privileges, and as you move outward, privileges decrease. Ring 0 (Kernel Mode): The...

Types of Attacks

CISSP Study Guide 3.1 Cryptography

In the realm of cybersecurity, we often encounter various types of attacks. We'll dig deeper into each of these attacks, providing a detailed breakdown of their mechanisms. But for now, let's look at the most comprehensive attacks, and explore other complex at...

Types of Law

CISSP Study Guide 1: Security and Risk Management

Type of Law Standard Description Criminal Law Beyond a reasonable doubt Contains prohibitions against actions like murder, assault, and robbery. Can lead to jailtime.  Civil Law Preponderance of evidence Addresses contractual disputes...

Identity, Access Management

CISSP Study Guide 5: Identity and Access Management

Key Term Description Examples Subject Active participant that requests access. Users, processes, organizations. Object Passive participant that responds to an access request. Files, printers, users, processes, orgs. Access Relat...

Exam 2

CISSP Study Guide Practice Exams

1, add if you have time 10. The separation of network infrastructure from the control layer, combined with the ability to centrally program a network design in a vendor-neutral, standards-based implementation, is an example of what important concept? A.   ...