Software security

This class was created by Brainscape user E Mi. Visit their profile to learn more about the creator.

By: E Mi

Decks in this class (16)

Information security, concepts and principles
How can software security be defined,
Is data privacy and data security...,
What is data privacy
48  cards
OWASP part 1
What are 3 topics of owasp,
What does an attacker want to ach...,
What does a developer want to ach...
59  cards
OWASP part 2
Exam question which security guid...,
Exam question which security guid...,
What is the security issue of coo...
66  cards
Cryptography
When do we have secure communication,
When do we have secure data storage,
What are the 2 steps of secure co...
54  cards
Authorization
What are the layers of access con...,
What is the policy layer of acces...,
What is the policy layer of acces...
41  cards
Authentication and SSO
What is sso,
What is the flow without sso,
What does the same origin policy ...
12  cards
Control hijacking
What does control hijacking compr...,
What is the attacker s goal of co...,
Name a way an attacker can achiev...
14  cards
Static analysis and Tools for Security
What are software weaknesses,
What are software vulnerabilities,
What is cwe
40  cards
Pen testing for web applications
What are the steps for a successf...,
How do you know what to look for ...,
What is a weakness of only using ...
8  cards
Threat modeling
What is threat modeling,
Why do we use threat modeling,
Name a principle in threat modeling
54  cards
Risk management during development
What is the idea behind risk mana...,
What are the stages of the risk m...,
What is the flow of the steps in ...
39  cards
Social engineering
What are some traits of people th...,
What does a hazard need to go thr...
2  cards
AI for security
How do ai and cyber security relate,
What is an impotant research dire...,
What is the purpose of ai for cyb...
18  cards
Privacy and GDPR
Define privacy,
What does privacy need to balance,
What is invasion of privacy
56  cards
Software supply chain security
What is the basic sw supply chain...,
What does the software supply cha...,
Name 4 properties of sw supply ch...
39  cards
Microservice security
Describe the monolithic architecture,
What are some downsides of using ...,
Desc
50  cards

More about
Software security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study E Mi's Software security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Software Douchebags
  • 15 decks
  • 2303 flashcards
  • 92 learners
Decks: Se3352 Final, Ece4436 Final, Se3316 Final, And more!
Security+ Practice exams
  • 38 decks
  • 2776 flashcards
  • 179 learners
Decks: Professor Messer Practice Questions, Comptia Practice Questions, Comptia Review Questions, And more!
Software Engineering
  • 21 decks
  • 603 flashcards
  • 42 learners
Decks: 3 Software Engineering 1 Grundlagen, 2 Modellieren 1 Was Ist Modellierung, 3 Se 2 Vorgehensmodelle, And more!
Make Flashcards