Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C706 SECURE SOFTWARE DESIGN STUDY GUIDE,VERY WELL EXPLAINED.

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
16-05-2022
Written in
2021/2022

C706 Secure Software Design Study Guide CIA Triad: Confidentiality: In information security, confidentiality "is the property, that information is not made available or disclosed to unauthorized individuals, entities, or processes" Integrity: In information security, data integrity means maintaining and assuring the accuracy and completeness of data over its entire life-cycle. This means that data cannot be modified in an unauthorized or undetected manner. This can be also used to validate databases to make sure none of the data is corrupt or modified in an unauthorized matter. Availability: For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. Secure Software Design Feature: Confidentiality: Public Key Infrastructure (PKI) and Cryptography/Encryption Availability: Offsite back-up and Redundancy Integrity: Hashing, Message Digest (MD5), non repudiation and digital signatures Software Architect: The software architect moves analysis to implementation and analyzes the requirements and use cases as activities to perform as part of the development process. That person can also develop class diagrams. Security Practitioner Roles: Release Manager: Deployment Architect: Design Developer: Coding Business Analyst/Project Manager: Requirements Gathering Red Team: These are teams of people familiar with the infrastructure of the company and the languages of the software being developed. Their mission is to kill the system as the developers build it. Static Analysis: Static analysis, also called static code analysis, is a method of computer program debugging that is done by examining the code without executing the program. The process provides an understanding of the code structure, and can help to ensure that the code adheres to industry standards. It's also referred as code review. MD5 Hash: The MD5 algorithm is a widely used hash function producing a 128-bit hash value. Although MD5 was initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption. (Integrity) SHA-256: The SHA (Secure Hash Algorithm) is one of a number of cryptographic hash functions. A cryptographic hash is like a signature for a text or a data file. SHA-256 algorithm generates an almost-unique, fixed size 256-bit (32-byte) hash. Hash is a one-way function – it cannot be decrypted back. (Integrity) Advanced Encryption Standard (AES): AES (acronym of Advanced Encryption Standard) is a symmetric encryption algorithm. The algorithm was developed by two Belgian cryptographer Joan Daemen and Vincent Rijmen. AES was Your text here 1 designed to be efficient in both hardware and software, and supports a block length of 128 bits and key lengths of 128, 192, and 256 bits. (Confidentiality) Stochastic: The analogy between safety and security is particularly close. The main difference is that safety-relevant faults are stochastic (i.e., unintentional or accidental), whereas security-relevant faults are “sponsored,” i.e., intentionally created and activated through conscious and intentional human agency. Fuzz Testing: Is used to see if the system has solid exception handling to the input it receives. Is the use of malformed or random input into a system in order to intentionally produce failure. This is a very easy process of feeding garbage to the system when it expects a formatted input, and it is always a good idea to feed as much garbage as possible to an input field. Three (3) Tier: The 3 tier architecture model removes the business logic from the client end of the system. It generally places the business logic on a separate server from the client. The data access portion of the system resides on a 3rd tier, which is separate from both the client and the business logic platform. T-MAP: USC’s Threat Modeling based on Attacking Path analysis (T-MAP) is a risk management approach that quantifies total severity weights of relevant attacking paths for COTS-based systems. T-MAP’s strengths lie in its ability to maintain sensitivity to an organization’s business value priorities and Information Technology (IT) environment, to prioritize and estimate security investment effectiveness and evaluate performance, and to communicate executivefriendly vulnerability details as threat profiles to help evaluate cost efficiency. Trike: Trike is an open source conceptual framework, methodology, and toolset designed to autogenerate repeatable threat models. Its methodology enables the risk analyst to accurately and completely describe the security characteristics of the system, from high-level architecture to low-level implementation of details. It also requires building a defensive model of the subject system. SDL Threat Modeling Tool: This free tool assists in the creation of threat models. It builds on Microsoft Visio and provides a tool for constructing graphic representation of threat models for the system without requiring expertise in security and also has the capability of graphically representing a software system and identifying vulnerabilities. Vulnerability Mapping: The overall goal of performing vulnerability mapping is to determine the most likely locations within the system in development where an attacker will strike. This is done on the design phase of the SDLC V3: This is the highest level of vulnerability. This is a very likely target for an attacker, such as free text input in a form. These are the highest priory for a security plan for the system and these should all be mitigated and accounted for by established control systems in development. V2: This is the moderate level vulnerability. These are possible but not probable targets. These will include interprocess communications on the server or traffic within the trust boundary of the system. Eavesdropping is the most significant risk in this situation. V2 level vulnerabilities should always be mitigated in the system, but in a trade off analysis, strict control may not be necessary as long as a procedure is in place to fail safely and protect any private or confidential data. V1: This is the lowest priority level of vulnerability. These are unlikely venues of attack with little risk if they are exploited. Failing safely is the most important concern at this level, because the data associated with this vulnerability has no value, and the process involved is not mission critical. An example of this level of vulnerability would be a transmission failure in a common HTML header coming from the system; the highest risk here is that the customer will not properly see the page and it would have to be reloaded. V1 vulnerabilities can largely be ignored, but they should be noted in the system specification in case functionality is altered by a later system update or interaction because this may allow them to become more significant. Activity Diagram: Is capable of expressing resolution efforts to malformed input and potential attacks in a way other documentation at the system level cannot. The caveat is that activity diagrams do not contain class calls and references; they only provide a visualization of the process logic. Kiviat Diagram: The Kiviat diagram provides a visual comparison of multiple attributes and can visualize and report the information on a single artifact based on monitored information. Identify the Assets: Is a threat model process that allows the company to identify the part that needs to be protected from unauthorized users. Agile Model: Describes a set of principles for software development under which requirements and solutions evolve through the collaborative effort of self-organizing cross-functional teams. It promotes adaptive planning, evolutionary development, early delivery, and continuous improvement, and it encourages rapid and flexible response to change. These principles support the definition and continuing evolution of many software development methods. It also avoids life cycle activities and focuses on built a little, test a little and field a little. It also supports informal communication and Incremental design. Software Development Models attributes: Agile: Cyclical Process, Supports quick prototyping and limits the time spent thinking about the problem as a whole. Waterfall: Similar to interactive model and main components are planning, development and deployment. Chrystal Clear: Crystal Clear can be applied to teams of up to 6 or 8 co-located developers working on systems that are not life-critical. The Crystal family of methodologies focus on efficiency and habitability as components of project safety. Crystal Clear focuses on people, not processes or artifacts. Roles may be filed by the same people, including a project manager and a business expert. Waterfall: The waterfall model is a sequential (non-iterative / Limited Interaction) design process, used in software development processes, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of conception, initiation, analysis, design, construction, testing, production/implementation and maintenance. All the requirements will be specified in the 1st step, uses a document driven approach (Large Amount of documentation) and has specific and identifiable stages. It also provides a resource to entry level developers with limited exposure. Waterfall Methodology Security concerns: Requirement Analysis: Define Security Features Design: Misuse cases and vulnerability mapping Construction and Implementation: Secure Coding practices Testing: Penetration Assessment Installation: Final Security Review Operation or Maintenance: Periodic security review and updates Digital Signatures: A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or documents. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, that the sender cannot deny having sent the message (authentication and non-repudiation), and that the message was not altered in transit (integrity). It also can be used as proof of approval by an authorized user. Redundancy: Data redundancy is the existence of data that is additional to the actual data and permits correction of errors in stored or transmitted data. The additional data can be simply a complete copy of the actual data, or only select pieces of data that allow detection of errors and reconstruction of lost or damaged data up to a certain level. This will make sure that all data will always be available, the data will not be lost and it will be stored at a another location for failover reasons. Hashing: Is the process of using an algorithm for verifying the integrity or authenticity of a computer file. This can be done by comparing two files bit-by-bit, but requires two copies of the same file, and may miss systematic corruptions which might occur to both files. A more popular approach is to also store checksums (hashes) (message digests) of files for later comparison. Software Assurance: The main objective of software assurance is to ensure that the processes, procedures, and products used to produce and sustain the software conform to all requirements and standards specified to govern those processes, procedures, and products. This can be also used to make sure that any web application meets the requirements of what it was designed to do and accessible to all that are authorized whether in the office or at a remote location. Sandboxing, isolating trusted processes, and proper handling of errors and exceptions, can all help secure a system in a high risk environment where the system is prone to attack. A common web server attack is a DOS or DDOS attack in which unsolicited TCP requests that overwhelm the web servers’ resources and make it unavailable. The SQL SELECT query command can allow an attacker to access tables within that particular database without requiring elevated and/or administrator permissions and jeopardizing the structure and relevance of the data that the database contains. One method of disallowing a SQL injection attack when handling user fields in a web from that reads or write to a database is to scrub all input of malicious code. Characterize the system and view the system as an adversary are the two steps of the threat model that data flow approaches. The two attacks that can affect both the operating system and databases are accessing ports that are not secured and/or locked down and the exploitation of default passwords that are not changed when the OS and the database were first installed. Acquisition and Implementation is the control domain the analysis and design phase of the SDLC. Monitoring and Delivery and support are the control domains do the sustainment phase of the SDLC. Coding takes place in the construction phase of the SDLC. Task Refinement: In Task Refinement, specific security activities must be identified when integrating security requirements into a work breakdown structure for the new software development effort. Release Manager: The Release Manager will conduct the code review process as one of the parts or process of the software development. The release manager can also be assigned the task of the deployment of the finished product to the various environments at project completion. Business Analyst: Has the SDLC role to identify the requirements of an application (example: Web Application). That business analyst must also be able to identify who will be impacted by such application. Once the application is developed in a test environment, the business analyst must insure that the user acceptance testing is completed and to standards. Tester Role: Has the responsibility to prepare a document plan that will verify that a systems code performs the proper actions that it was designed to do. SQL Injection: SQL injection is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution. This can be done from any form or place that allows the attacker to enter any type of information which is somewhat connected to a database. Beta version: The focus of beta version is reducing impacts to users, often incorporating usability testing and expectation of functionality. Beta version software is often useful for demonstrations and previews within an organization and to prospective customers. STRIDE categories: STRIDE is a classification scheme for characterizing/measuring known threats/vulnerabilities according to the kinds of exploit that are used (or motivation of the attacker). It also focuses on the end results of possible attacks rather than on the identification of each specific attack. The STRIDE acronym is formed from the first letter of each of the following categories. (S) Spoofing Identity “Identity spoofing” is a key risk for applications that have many users but provide a single execution context at the application and database level. In particular, users should not be able to become any other user or assume the attributes of another user. (T) Tampering with Data Users can potentially change data delivered to them, return it, and thereby potentially manipulate client-side validation, GET and POST results, cookies, HTTP headers, and so forth. The application should not send data to the user, such as interest rates or periods, which are obtainable only from within the application itself. The application should also carefully check data received from the user and validate that it is sane and applicable before storing or using it. (R) Repudiation Users may dispute transactions if there is insufficient auditing or recordkeeping of their activity. For example, if a user says, “But I didn’t transfer any money to this external account!”, and you cannot track his/her activities through the application, then it is extremely likely that the transaction will have to be written off as a loss. Therefore, consider if the application requires non-repudiation controls, such as web access logs, audit trails at each tier, or the same user context from top to bottom. Preferably, the application should run with the user’s privileges, not more, but this may not be possible with many off-the-shelf application frameworks. (I) Information Disclosure Users are rightfully wary of submitting private details to a system. If it is possible for an attacker to publicly reveal user data at large, whether anonymously or as an authorized user, there will be an immediate loss of confidence and a substantial period of reputation loss. Therefore, applications must include strong controls to prevent user ID tampering and abuse, particularly if they use a single context to run the entire application. Also, consider if the user’s web browser may leak information. Some web browsers may ignore the no caching directives in HTTP headers or handle them incorrectly. In a corresponding fashion, every secure application has a responsibility to minimize the amount of information stored by the web browser, just in case it leaks or leaves information behind, which can be used by an attacker to learn details about the application, the user, or to potentially become that user. Finally, in implementing persistent values, keep in mind that the use of hidden fields is insecure by nature. Such storage should not be relied on to secure sensitive information or to provide adequate personal privacy safeguards. (D) Denial of Service Application designers should be aware that their applications may be subject to a denial of service attack. Therefore, the use of expensive resources such as large files, complex calculations, heavy-duty searches, or long queries should be reserved for authenticated and authorized users, and not available to anonymous users. For applications that do not have this luxury, every facet of the application should be engineered to perform as little work as possible, to use fast and few database queries, to avoid exposing large files or unique links per user, in order to prevent simple denial of service attacks. (E) Elevation of Privilege If an application provides distinct user and administrative roles, then it is vital to ensure that the user cannot elevate his/her role to a higher privilege one. In particular, simply not displaying privileged role links is insufficient. Instead, all actions should be gated through an authorization matrix, to ensure that only the permitted roles can access privileged functionality. DREAD (Risk Assessment Model): DREAD is part of a system for risk-assessing computer security threats previously used at Microsoft and currently used by OpenStack and many other corporations. It provides a mnemonic for risk rating security threats using five categories. The categories are:  Damage - how bad would an attack be? Ranks the extent of harm that occurs if a vulnerability is exploited.  Reproducibility - how easy is it to reproduce the attack? Ranks how often an attempt at exploiting a vulnerability really works.  Exploitability/Vulnerability - how much work is it to launch the attack? Measures the effort required to launch the attack.  Affected users - how many people will be impacted? Measures the number of installed instances of the system affected by an exploit.  Discoverability - how easy is it to discover the threat? States the likelihood that a vulnerability will be found by security researchers or hackers. The DREAD name comes from the initials of the five categories listed and analyzes threats as part of the breakdown structure. When a given threat is assessed using DREAD, each category is given a rating on probability and damage potential. For example, 3 for high, 2 for medium, 1 for low and 0 for none. (Rating scales running from 0 to 10 are common) The sum of all ratings for a given exploit can be used to prioritize among different exploits. Threat Model: A threat model is a diagram and description that tells a story of how an attacker could exploit the vulnerability. This is not a step by step process, but a narrative approach to the attack that should help guide the mitigation techniques that need to be put in place to protect the system at that point. It can also define the security of an application and reduces the number of vulnerabilities. It also has the 2 steps of identifying and prioritizing vulnerabilities. Sequence Diagram: Is a detailed breakdown of the communication that will occur between actors and system objects or components. A sequence diagram bridges the gap between the business analysis and the development analysis; this type of diagram can be considered a business description or a development description of system functionality. T-Map: T-MAP defines a set of threat-relevant attributes for each layers or nodes. These attributes can be classified as either probability-relevant, size-of-loss relevant, or descriptive. These class attributes are primarily derived from Common Vulnerability Scoring System (CVSS). SDLC Management Control Domains: Planning / Organization: Project Definition, User Requirements Definition and Systems Requirement Definition. Acquisition / Implementation: User Requirements Definition, System Requirement Definition, Analysis and Design and System Build / Prototype / Pilot Delivery and Support: Analysis and Design, System Build / Prototype / Pilot, Implementation and Training and Sustainment. Monitoring: User Requirements Definition, Systems Requirements Definition, Analysis and Design, System Build / Prototype / Pilot, Implementation and Training and Sustainment. Requirements Analysis: Is a phase of the SDLC that defines security functions that an application should satisfy. The designated employee can also speak with several stakeholders to determine the expected end state of the application. Testing Phase: Security should be involved in all phases of the SDLC, but exploitation of vulnerabilities to identify weaknesses should be done in the testing phase Incident Response Plan: An Incident response plan is an organized approach to addressing and managing the aftermath of a security breach or compromise on a system or software. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. The incident response plan will take place at the operation phase of the SDLC. Earned Value Management: BCWS: Budget Cost Work Scheduled BCWP: Budget Cost of Work Performed SV: Scheduled Variance CV: Cost Variance SV= BCWP - BCWS CV= BCWP - ACWP Steps in the Work Breakdown Structure (WBS): 1) Examine the set of required external deliverables. 2) Identify and list the steps and tasks needed to produce the required deliverables, including any tasks for additional intermediate deliverables needed to complete the final deliverable. 3) Sequence the identified tasks required to produce the deliverable. 4) Estimate the effort required to perform each task. 5) Estimate the productivity of the resources that will be applied to the tasks. 6) Compute the time needed for each task by dividing the task effort estimates by the resource productivity estimates. 7) Lay out the time needed for each task and "label" each task with its task name and the assigned resources; this layout of sequences of tasks with their associated time and resources essentially forms the initial schedule. Capability Maturity Model Integration (CMMI) levels: ML5 Organizational innovations and deployment Casual analysis and resolution Overall testing to achieve efficiencies ML4 Organizational process performance Quantitative project management ML3 Requirements development Technical solution Product integration Verification Validation Organizational process focus Organizational process definition Organizational training Integrated project management Risk Management Integrated teaming Integrated supplier management Decision analysis and resolution Organizational environment for integration ML2 Requirements management Project planning Project monitoring and control Supplier agreement management Measurement and analysis Process and product quality assurance Configuration management ML1 NONE The Processes areas of CMMI: Process Management: 1) Organizational process focus 2) Organizational process definition 3) Organizational Training 4) Organizational process performance 5) Organizational innovation and deployment Project Management: 1) Project Planning 2) Project Monitoring and control 3) Supplier agreement management 4) Integrated project management 5) Risk Management 6) Integrated teaming 7) Integrated supplier management 8) Quantitative project management Engineering: 1) Requirements development 2) Requirements Management 3) Technical Solution 4) Product Integration 5) Verification 6) Validation Support: 1) Configuration Management 2) Process and product quality assurance 3) Measurement and Analysis 4) Organizational environment for integration 5) Decision analysis and resolution 6) Casual analysis and resolution Rational Unified Process (RUP): Short for Rational Unified Process, a software development methodology from Rational. Based on UML, RUP organizes the development of software into four phases, each consisting of one or more executable iterations of the software at that stage of development. It's also an interactive and incremental model that utilizes the divide and conquer methodology to decompose a complex problem into smaller parts. It's also heavy with formal, established framework. Extreme Programming (XP): Based on four core values of communication, simplicity, feedback, and courage. It also includes fundamental principles of incremental change, embracing change and quality of work. Scrum: A disciplined method that can be combined with other techniques. Warm Site: Might be a designated building with servers, computers, and the needed office space, but with no active connections or running servers. Data Encryption Standard (DES): DES was the formal United States national standard cryptosystem for securing information; it's an example of a Feistel cipher using a 56-birt key. It's now considered breakable, but it survives in the form of 3-DES, which is the use of encryption using three separate keys. Secure Software Assurance (SSA): Use of established quality assurance practices and fault tolerance techniques; Ability of software to operate dependably, despite the presence of sponsored faults and security as a part of the software specified in the beginning of the software development process. White Box Testing: Source code fault injection, direct code analysis and property based testing. Black Box Testing: Fuzz testing, byte code, assembler code and binary code scanning. Unintentional disclosure: This occurs when your software prints too much information in response to queries or when it prints to public error logs. Internal data can often be the target of the attacker, so what you share via output in development or in production needs to be considered as a possible source of compromise. Man in the Middle Attack: In cryptography and computer security, a man-in-the-middle attack (often abbreviated MitM, MiM attack, MitMA or the same using all capital letters) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. Attack surface in relation to threat: Network: Sniffing Operating system: Rootkit Programming Languages: Buffer Overflow Database Application: SQL Injection Quality Assurance: Refers to all activities designed to measure and improve quality in a product , including the whole process, training, preparation of the team, and activities associated with customer feedback.

Show more Read less
Institution
Course

Content preview

C706 Secure Software Design Study Guide

CIA Triad:

Confidentiality: In information security, confidentiality "is the property, that information is not made available or
disclosed to unauthorized individuals, entities, or processes"

Integrity: In information security, data integrity means maintaining and assuring the accuracy and completeness of data
over its entire life-cycle. This means that data cannot be modified in an unauthorized or undetected manner. This can be
also used to validate databases to make sure none of the data is corrupt or modified in an unauthorized matter.

Availability: For any information system to serve its purpose, the information must be available when it is needed. This
means that the computing systems used to store and process the information, the security controls used to protect it, and
the communication channels used to access it must be functioning correctly.

Secure Software Design Feature:

Confidentiality: Public Key Infrastructure (PKI) and Cryptography/Encryption
Availability: Offsite back-up and Redundancy
Integrity: Hashing, Message Digest (MD5), non repudiation and digital signatures

Software Architect: The software architect moves analysis to implementation and analyzes the requirements and use
cases as activities to perform as part of the development process. That person can also develop class diagrams.

Security Practitioner Roles:

Release Manager: Deployment
Architect: Design
Developer: Coding
Business Analyst/Project Manager: Requirements Gathering

Red Team: These are teams of people familiar with the infrastructure of the company and the languages of the software
being developed. Their mission is to kill the system as the developers build it.

Static Analysis: Static analysis, also called static code analysis, is a method of computer program debugging that is done
by examining the code without executing the program. The process provides an understanding of the code structure, and
can help to ensure that the code adheres to industry standards. It's also referred as code review.

MD5 Hash: The MD5 algorithm is a widely used hash function producing a 128-bit hash value. Although MD5 was
initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. It
can still be used as a checksum to verify data integrity, but only against unintentional corruption. (Integrity)

SHA-256: The SHA (Secure Hash Algorithm) is one of a number of cryptographic hash functions. A cryptographic hash
is like a signature for a text or a data file. SHA-256 algorithm generates an almost-unique, fixed size 256-bit (32-byte)
hash. Hash is a one-way function – it cannot be decrypted back. (Integrity)

Advanced Encryption Standard (AES): AES (acronym of Advanced Encryption Standard) is a symmetric encryption
algorithm. The algorithm was developed by two Belgian cryptographer Joan Daemen and Vincent Rijmen. AES was




Your text here

, designed to be efficient in both hardware and software, and supports a block length of 128 bits and key lengths of 128,
192, and 256 bits. (Confidentiality)

Stochastic: The analogy between safety and security is particularly close. The main difference is that safety-relevant
faults are stochastic (i.e., unintentional or accidental), whereas security-relevant faults are “sponsored,” i.e., intentionally
created and activated through conscious and intentional human agency.

Fuzz Testing: Is used to see if the system has solid exception handling to the input it receives. Is the use of malformed or
random input into a system in order to intentionally produce failure. This is a very easy process of feeding garbage to the
system when it expects a formatted input, and it is always a good idea to feed as much garbage as possible to an input
field.

Three (3) Tier: The 3 tier architecture model removes the business logic from the client end of the system. It generally
places the business logic on a separate server from the client. The data access portion of the system resides on a 3rd tier,
which is separate from both the client and the business logic platform.

T-MAP: USC’s Threat Modeling based on Attacking Path analysis (T-MAP) is a risk management approach that
quantifies total severity weights of relevant attacking paths for COTS-based systems. T-MAP’s strengths lie in its ability
to maintain sensitivity to an organization’s business value priorities and Information Technology (IT) environment, to
prioritize and estimate security investment effectiveness and evaluate performance, and to communicate executive-
friendly vulnerability details as threat profiles to help evaluate cost efficiency.

Trike: Trike is an open source conceptual framework, methodology, and toolset designed to autogenerate repeatable
threat models. Its methodology enables the risk analyst to accurately and completely describe the security characteristics
of the system, from high-level architecture to low-level implementation of details. It also requires building a defensive
model of the subject system.

SDL Threat Modeling Tool: This free tool assists in the creation of threat models. It builds on Microsoft Visio and
provides a tool for constructing graphic representation of threat models for the system without requiring expertise in
security and also has the capability of graphically representing a software system and identifying vulnerabilities.

Vulnerability Mapping:

The overall goal of performing vulnerability mapping is to determine the most likely locations within the system in
development where an attacker will strike. This is done on the design phase of the SDLC

V3: This is the highest level of vulnerability. This is a very likely target for an attacker, such as free text input in a form.
These are the highest priory for a security plan for the system and these should all be mitigated and accounted for by
established control systems in development.

V2: This is the moderate level vulnerability. These are possible but not probable targets. These will include interprocess
communications on the server or traffic within the trust boundary of the system. Eavesdropping is the most significant risk
in this situation. V2 level vulnerabilities should always be mitigated in the system, but in a trade off analysis, strict control
may not be necessary as long as a procedure is in place to fail safely and protect any private or confidential data.

V1: This is the lowest priority level of vulnerability. These are unlikely venues of attack with little risk if they are
exploited. Failing safely is the most important concern at this level, because the data associated with this vulnerability has
no value, and the process involved is not mission critical. An example of this level of vulnerability would be a
transmission failure in a common HTML header coming from the system; the highest risk here is that the customer will

Written for

Institution
Course

Document information

Uploaded on
May 16, 2022
Number of pages
10
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$15.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Classroom NURSING
Follow You need to be logged in order to follow users or courses
Sold
4885
Member since
4 year
Number of followers
3233
Documents
55440
Last sold
1 day ago
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Read more Read less
4.0

1192 reviews

5
631
4
216
3
196
2
40
1
109

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions