Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C706 Study Guide Secure Software Design Study Guide 2026 Questions Complete With Correct Answers

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
15-01-2026
Written in
2025/2026

WGU C706 Study Guide Secure Software Design Study Guide 2026 Questions Complete With Correct Answers Supply Chain Security Risks for Software Acquisition Lifecycle: Initiation Phase -Perform an initial software supply chain security risk assessment and establish required security properties. -Include supply chain security risk management as part of the RFP. -Develop plans for monitoring suppliers. -Select Suppliers that address supply chain security risk. Supply Chain Security Risks for Software Acquisition Lifecycle: Development Phase -Monitor practices for supply chain security risk management. -Maintain awareness of suppliers sub tier relationships. Supply Chain Security Risks for Software Acquisition Lifecycle: Configuration/Deployment Phase -Assess delivered products/systems. -Configure/integrate with consideration of supply chain security risks. -Develop user guidance to help mitigate supply chain security risk. Supply Chain Security Risks for Software Acquisition Lifecycle: Operations/Maintenance Phase -Manage security incidents. -Review operational readiness. -Monitor component/supplier. Supply Chain Security Risks for Software Acquisition Lifecycle: Disposal Phase -Mitigate risks of information disclosure during disposal. Complete Mediation · Identification of the entity making the access request · Verification that the request has not changed since its initiation. · Application of the appropriate authorization procedures · Reexamination of previously authorized requests by the same entity · Requires that all access to objects be checked to ensure they are allowed. Whenever a subject attempts to read an object, the operating system should mediate the action. First, it determines if the subject can read the object. If so, it provides the resources for the read to occur. Economy of Mechanism The principle of economy of mechanism states that security mechanisms should be as simple as possible. If a design and implementation are simple, fewer possibilities exist for errors. The checking and testing process is less complex because fewer components and cases need to be tested. Open Design Says that your system security shouldn't rely on the secrecy of your implementation. This is a particularly important principle for security concepts like cryptographic implementations. Well-designed cryptography implementations are published publicly. Least Common Mechanism States that mechanisms used to access resources should not be shared. Sharing resources provides a channel along which information can be transmitted, and so such sharing should be minimized. Ex. We don't reuse our passwords from service accounts and other subjects. Fail-Safe Defaults Design Principle (failing securely for software) Pertains to allowing access to resources based on granted access over access exclusion. This principle is a methodology for allowing resources to be accessed only if explicit access is granted to a user. By default, users do not have access to any resources until access has been granted. This approach prevents unauthorized users from gaining access to resource until access is given. Economy of Mechanism Design Principle Requires that systems should be designed as simple and small as possible. Design and implementation errors result in unauthorized access to resources that would not be noticed during normal use. Complete Mediation Design Principle States that every access to every resource must be validated for authorization. Open Design Design Principle A concept that the security of a system and its algorithms should not be dependent on secrecy of its design or implementation. Separation Privilege Design Principle Requires that all resource approved resource access attempts be granted based on more than a single condition. For example, a user should be validated for active status and has access to the specific resource. Least Common Mechanism Design Principle Declares that mechanisms used to access resources should not be shared. Psychological Acceptability Design Principle Refers to security mechanisms not make resources more difficult to access than if the security mechanisms were not present. Defense in Depth Design Principle A concept of layering resource access authorization verification in a system reduces the chance of a successful attack. This layered approach to resource authorization requires unauthorized users to circumvent each authorization attempt to gain access to a resource. Non-Functional Requirement Describe how the system works. • Logging • Error Handling • CIA + Authorization Functional Requirement Describe what the system should do.

Show more Read less
Institution
WGU C706 Secure Software Design
Course
WGU C706 Secure Software Design

Content preview

WGU C706 Study Guide Secure Software Design Study
Guide 2026 Questions Complete With Correct Answers




Supply Chain Security Risks for Software Acquisition Lifecycle:

Initiation Phase

-Perform an initial software supply chain security risk assessment and establish required
security properties.
-Include supply chain security risk management as part of the RFP.
-Develop plans for monitoring suppliers.
-Select Suppliers that address supply chain security risk.

Supply Chain Security Risks for Software Acquisition Lifecycle:

Development Phase

-Monitor practices for supply chain security risk management.
-Maintain awareness of suppliers sub tier relationships.

Supply Chain Security Risks for Software Acquisition Lifecycle:

Configuration/Deployment Phase

-Assess delivered products/systems.
-Configure/integrate with consideration of supply chain security risks.
-Develop user guidance to help mitigate supply chain security risk.

Supply Chain Security Risks for Software Acquisition Lifecycle:

Operations/Maintenance Phase

-Manage security incidents.
-Review operational readiness.
-Monitor component/supplier.

, Supply Chain Security Risks for Software Acquisition Lifecycle:

Disposal Phase

-Mitigate risks of information disclosure during disposal.

Complete Mediation

· Identification of the entity making the access request
· Verification that the request has not changed since its initiation.
· Application of the appropriate authorization procedures
· Reexamination of previously authorized requests by the same entity
· Requires that all access to objects be checked to ensure they are allowed. Whenever a subject
attempts to read an object, the operating system should mediate the action. First, it determines
if the subject can read the object. If so, it provides the resources for the read to occur.

Economy of Mechanism

The principle of economy of mechanism states that security mechanisms should be as simple as
possible. If a design and implementation are simple, fewer possibilities exist for errors. The
checking and testing process is less complex because fewer components and cases need to be
tested.

Open Design

Says that your system security shouldn't rely on the secrecy of your implementation. This is a
particularly important principle for security concepts like cryptographic implementations. Well-
designed cryptography implementations are published publicly.

Least Common Mechanism

States that mechanisms used to access resources should not be shared. Sharing resources
provides a channel along which information can be transmitted, and so such sharing should be
minimized. Ex. We don't reuse our passwords from service accounts and other subjects.

Fail-Safe Defaults Design Principle (failing securely for software)

Pertains to allowing access to resources based on granted access over access exclusion. This
principle is a methodology for allowing resources to be accessed only if explicit access is granted
to a user. By default, users do not have access to any resources until access has been granted.
This approach prevents unauthorized users from gaining access to resource until access is given.

Economy of Mechanism Design Principle

Written for

Institution
WGU C706 Secure Software Design
Course
WGU C706 Secure Software Design

Document information

Uploaded on
January 15, 2026
Number of pages
13
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
IszackBd University Of Washington
Follow You need to be logged in order to follow users or courses
Sold
31
Member since
1 year
Number of followers
1
Documents
4828
Last sold
2 days ago
IszackBd Stuvia

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. FOR ANY REQUEST FEEL FREE TO REACH US

Read more Read less
5.0

3 reviews

5
3
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions