cloud - internet based data storage and processing, continuous delivery (CD) - automatically testing code prior to production; manual approval deploys the final product, continuous integration (CI) - frequently merging tested improvements to software in a shared repository, copyright - the legal right of the creator of a work to determine how that work is used, dynamic application security testing (DAST) - or 'black box' testing; testing for outputs with known inputs, Essential Eight - an industry framework designed to assist all businesses to become cyber secure and resistant to cyber attack, ethics - principles of right and wrong that are accepted by individual or a social group; ethical behaviour often guides policymakers within organisations, goal - an anticipated result or aim, which is specific, measurable, achievable and timely, Information Security Manual - advice for businesses published by the Australian Cyber Security Centre, interactive application security testing (IAST) - testing that monitors running applications with sensors to detect vulnerabilities in real time, MFA and 2FA - multi-factor authentication and two-factor , mission statement - statement setting out an organisation's purpose or what it is trying to achieve, non-disclosure agreement (NDA) - a contractual agreement restricting the ability to use or share information, onboarding and induction practices - processes to intergrate and train new employees in company culture and job responsibilities, open source - source code that is available free and can be modified, organisational goal - how an organisation intends to go about achieving its mission, piracy - the illegal making and distributing of copies of games, music and software, risk management plans - strategies and processes for identifying, assessing and mitigating project or organisational risks, software as a service (SaaS) - applications with all other support maintained by the cloud provider, Static application security testing (SAST) - also known as "white-box" testing. Applied during development stage to 100% of the code base, it may be automated to identity vulnerabilities. , Runtime application self-protection (RASP) - provides ongoing security checks and monitoring of all activity and can respond to cyber attacks by raising and alert and terminating the session.,
0%
Software Security Essentials
공유
공유
공유
만든이
Melzulfic
Y11
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
매치업
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
AI 강화: 이 활동에는 AI가 생성한 콘텐츠가 포함되어 있습니다.
더 알아보세요.
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?