From the course: CCSP Cert Prep: 4 Cloud Application Security Audio Review
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Software security assessment
From the course: CCSP Cert Prep: 4 Cloud Application Security Audio Review
Software security assessment
- [Instructor] In Chapter Four of the video course, I discussed software security assessment. Let's review some of the key concepts. (intensifying swoosh) There are three ways that an organization can use a structured approach to threat identification. First, the organization can use an asset-focused approach. In this approach, analysts use the organization's asset inventory as the basis for their analysis, and walk through asset by asset, identifying the potential threats to that asset. Second, an organization can use a threat-focused approach. Using this method, the organization thinks of all the possible threats out there, and then thinks through how those threats might affect different organizational information systems. Finally, an organization can use a service-focused approach. This is most commonly used by service providers who offer services over the internet to other organizations. (intensifying swoosh) As…
Contents
-
-
-
(Locked)
Secure software development lifecycle2m 29s
-
(Locked)
Secure software development lifecycle Q&A1m 14s
-
(Locked)
Application security vulnerabilities2m 6s
-
(Locked)
Application security vulnerabilities Q&A1m 17s
-
(Locked)
Secure coding practices1m 49s
-
(Locked)
Secure coding practices Q&A1m 13s
-
(Locked)
Software security assessment2m 46s
-
(Locked)
Software security assessment Q&A1m 30s
-
(Locked)
Verified secure software2m 2s
-
(Locked)
Verified secure software Q&A55s
-
(Locked)
Cloud application architecture2m 28s
-
(Locked)
Cloud application architecture Q&A1m 18s
-
(Locked)
-