S



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Race Condition phylum
Ranking and synthesizing risks, RMF
RATS code scanner
Raw analysis results, tutorial
Readings. [See Bibliography.]
References [See Bibliography.]
Reformed hackers
Regulations, security
Renaissance, computer security
Reports, RMF analysis
Required reading
Resource Injection phylum
Return on investment (ROI) 2nd
Risk analysis
    architectural level. [See Architectural risk analysis.]
     definition
     exercise
     versus threat modeling
Risk calculation
     impact
     modern model
     traditional model
Risk management framework (RMF). [See RMF (risk management framework).]
Risk management. [See also RMF (risk management framework).]
     applied risk management pillar
     definition
     risk-based security testing
Risk-based security testing
     adversarial testing
     and penetration testing
     automation
     conditions tested
     constructive/destructive nature
     description
     example
     eXtreme programming
     firewalls
     flyover
     functional testing
     Insideout approach
     Java card, example
     malicious input
     methodology 2nd
     multithreading
     outside in approach
     perimeter defense
     personnel involved
     process overview
     risk management [See also RMF (risk management framework).]
     smart cards, example
     SOAP protocol
     "test-driven" design
     timing
Risks
     analysis report
     architectural risk analysis
     business and technical, identifying 2nd
     data review
     definition
     impacts
     indicators
     likelihood scale
    management framework. [See RMF]
     measuring and reporting
    mitigation strategies
         defining 2nd
         penetration testing
         risks 2nd
         RMF
     questionnaires
     ranking
     severity key
     synthesizing
     synthesizing and ranking 2nd
RMF (risk management framework)
    example
         business goal rankings
         business impact scale
         business peer review
         business risk indicators
         business risks 2nd 3rd
         carrying out fixes and validation
         defining a mitigation strategy
         deliverables
         fixes
         gathering artifacts
         goal-to-risk relationship
         identifying business and technical risks
         likelihood of occurrence
         prioritized business goals
         product risks
         project research
         project risks
         ranking risks
         research and interview data analysis
         risk analysis report
         risk data review
         risk impacts
         risk indicators
         risk likelihood scale
         risk mitigation
         risk questionnaires
         risk severity key
         software artifact analysis
         synthesizing and ranking risks
         target project team
         technical peer review
         technical risks 2nd 3rd 4th
         understanding business context
         validation
     iterative processing
     measuring and reporting risk
     process diagram
    stages of activity
         carrying out fixes and validation 2nd
         defining the risk mitigation strategy 2nd
         identifying business and technical risks 2nd
         synthesizing and ranking risks 2nd
         understanding business context 2nd
ROI (return on investment) 2nd
Rootkits
Rubin, Avi
Rules
     coverage
     example
    Fortify. [See Fortify Source Code Analysis Suite.]
     ITS4. [See also Taxonomy of coding errors, kingdoms.]
         history of
         list of
     knowledge catalog 2nd 3rd
     schema
Rules Builder




Software Security. Building Security In
Software Security: Building Security In
ISBN: 0321356705
EAN: 2147483647
Year: 2004
Pages: 154
Authors: Gary McGraw

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net