SGreene > 8-62.3 Secure Coding Practices > Flashcards
The process used to anticipate threats
Threat Modeling
Allow only the minimum levels of access necessary to perform tasks or functions
Least privilege
Cryptographic method to confirm authenticity and integrity
Code signing
Property that describes an applications ability to withstand attack
Survivability
All of the points where an attacker can try to enter or extract dats
Attack Surface