Page 1601 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1601
Chapter 20: Software Development Security
1. The primary key uniquely identifies each row in the table. For
example, an employee identification number might be the primary
key for a table containing information about employees.
2. Polyinstantiation is a database security technique that appears to
permit the insertion of multiple rows sharing the same uniquely
identifying information.
3. Static analysis performs assessment of the code itself, analyzing the
sequence of instructions for security flaws. Dynamic analysis tests
the code in a live production environment, searching for runtime
flaws.
4. One phase.

