Secure Application Development
Across
- 3. Makes sure the system is updated/configured
- 5. Automation is key to cloud computing, Entire application instances can be instantly provisioned, instances can move around the world as needed,
- 6. Secure environment, Writing code, Developers test code in sandboxes
- 10. the use of tools and methods to help perform tasks
- 11. making sure what is supposed to be input is being input
- 13. Safely move from a non-production phase to full production
- 16. Application is live
- 17. deployments, application software security, network security, software deployed to workstations
- 19. Single Points Of Failure, Things dependent upon on piece of code
- 21. the base for building scripts, Helps save time when building applications
- 22. Once changes are made, they make it to the production
- 23. also known as software development kits (SDK), Save a lot of time, Increase the functionality of a language
- 24. How does it work with real data? Run performance tests, Test usability and features.
- 26. the first step of validating inputs, It checks to make sure if the answer looks “normal”
- 27. using old code to help in the making of new applications
- 28. defined functions that are stored in a database engine
- 30. Scripts monitor whether an event happens or not
- 32. Prevents user errors, Multiple processes at once
- 33. increases capacity during high-demand times, Decreases capacity during low-demand times
- 34. Installing new web server, database server, middleware server, user workstation configurations, certificate updates
- 35. what it produces is useless to the rest of the code, Need to eliminate if possible
- 37. Open Web Application Security Project, Works to improve the security of software
- 38. Firewall settings, patch levels, OS file versions, Failure requires immediate correction
- 39. Program that translates computer code into binary
Down
- 1. Actions/Work that are automatically completed
- 2. Guarantee apps are provisioned, Guarantee apps are deprovisioned, Verify code has not been tampered with
- 4. A system can take on bigger workloads by adding resources
- 6. Dismantling and removing an application instance
- 7. Track changes/updates, revert back to a previous version
- 8. Language of computers
- 9. IT departments can work off this schedule and plan around it
- 12. Operating system changes, application changes
- 14. an isolated testing environment, Try some code, break some code, nobody gets hurt
- 15. Secure VLAN, internal access, external access
- 18. losing control of data during operations
- 20. All pieces put together, Does it all work as expected?
- 22. validation that checks for errors on the client’s app
- 25. Merging developer’s changes with main branch
- 27. Automatically updates changes to environments
- 29. Check for malicious code, Verify security posture of workstation
- 31. taking something super easy and making it very hard to understand, Developers will take very simple code and make it very unreadable
- 36. validation that checks for errors on the server