Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
CISSP OSG
> Chapter 20: Software Development Security > Flashcards
Chapter 20: Software Development Security Flashcards
(0 cards)
Study These Flashcards
CISSP OSG
flashcards
Decks in class (19)
# Cards
Chapter 3: Business Continuity Planning
34
Chapter 4: Laws, Regulations, and Compliance
44
Chapter 5: Protecting Security of Assets
45
Chapter 6: Cryptography and Symmetric Key Algorithms
36
Chapter 7: PKI and Cryptographic Applications
17
Chapter 8: Principles of Security Models, Design, and Capabilities
54
Chapter 9: Security Vulnerabilities, Threats, and Countermeasures
63
Chapter 10: Physical Security Requirements
11
Chapter 11: Secure Network Architecture and Components
35
Chapter 12: Secure Communications and Network Attacks
15
Chapter 13: Managing Identity and Authentication
9
Chapter 14: Controlling and Monitoring Access
20
Chapter 15: Security Assessment and Testing
46
Chapter 16: Managing Security Operations
12
Chapter 17: Preventing and Responding to Incidents
16
Chapter 18: Disaster Recovery Planning
8
Chapter 19: Investigations and Ethics
0
Chapter 20: Software Development Security
0
Chapter 21: Malicious Code and Application Attacks
12