cloud - internet based data storage and processing, continuous delivery (CD) - automatically testing code prior to production; manual approval deploys the final product, continuous integration (CI) - frequently merging tested improvements to software in a shared repository, copyright - the legal right of the creator of a work to determine how that work is used, dynamic application security testing (DAST) - or 'black box' testing; testing for outputs with known inputs, Essential Eight - an industry framework designed to assist all businesses to become cyber secure and resistant to cyber attack, ethics - principles of right and wrong that are accepted by individual or a social group; ethical behaviour often guides policymakers within organisations, goal - an anticipated result or aim, which is specific, measurable, achievable and timely, Information Security Manual - advice for businesses published by the Australian Cyber Security Centre, interactive application security testing (IAST) - testing that monitors running applications with sensors to detect vulnerabilities in real time, MFA and 2FA - multi-factor authentication and two-factor , mission statement - statement setting out an organisation's purpose or what it is trying to achieve, non-disclosure agreement (NDA) - a contractual agreement restricting the ability to use or share information, onboarding and induction practices - processes to intergrate and train new employees in company culture and job responsibilities, open source - source code that is available free and can be modified, organisational goal - how an organisation intends to go about achieving its mission, piracy - the illegal making and distributing of copies of games, music and software, risk management plans - strategies and processes for identifying, assessing and mitigating project or organisational risks, software as a service (SaaS) - applications with all other support maintained by the cloud provider, Static application security testing (SAST) - also known as "white-box" testing. Applied during development stage to 100% of the code base, it may be automated to identity vulnerabilities. , Runtime application self-protection (RASP) - provides ongoing security checks and monitoring of all activity and can respond to cyber attacks by raising and alert and terminating the session.,
0%
Software Security Essentials
Compartir
Compartir
Compartir
per en/la
Melzulfic
Y11
Editar continguts
Imprimir
Incrustar
Més
Assignacions
Tauler de classificació
Mostrar-ne més
Mostrar-ne menys
Aquesta taula de classificació és privada actualment. Fés clic a
Compartir
per fer-la públic.
El propietari del recurs ha inhabilitat aquesta taula de classificació.
Aquesta taula de classificació està inhabilitada perquè que les teves opcions són diferents a les del propietari del recurs.
Reverteix les opcions
Emparellar
és una plantilla de final obert. No genera puntuacions per a una taula de classificació.
Cal iniciar la sessió
Estil visual
Tipus de lletra
Subscripció obligatòria
Opcions
AI Enhanced: Aquesta activitat conté contingut generat per IA.
Aprèn més.
Canvia de fonament
Mostrar-ho tot
Apareixeran més formats a mesura que jugueu a l'activitat.
Resultats oberts
Copiar enllaç
Codi QR
Suprimir
Restaurar desada automàtica:
?