Page 1601 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1601

Chapter 20: Software Development Security




                1.  The primary key uniquely identifies each row in the table. For

                    example, an employee identification number might be the primary
                    key for a table containing information about employees.

                2.  Polyinstantiation is a database security technique that appears to
                    permit the insertion of multiple rows sharing the same uniquely
                    identifying information.

                3.  Static analysis performs assessment of the code itself, analyzing the
                    sequence of instructions for security flaws. Dynamic analysis tests
                    the code in a live production environment, searching for runtime

                    flaws.

                4.  One phase.
   1596   1597   1598   1599   1600   1601   1602   1603   1604   1605   1606