O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter summary

  • Security should permeate every phase of the software development life cycle (SLDC). The SDLC phases include project initiation, functional design, system design, software development, installation/test, operational maintenance, and disposal/end of life.

  • Change control and configuration management help stabilize the software development environment.

  • Separation of duties to avoid conflicts of interest should be implemented within the software development environment.

  • Component Object Model (COM) and Distributed Component Object Model (DCOM) allow processes to share processes and data in Microsoft applications. Object request brokers (ORB) and common object request brokers architecture (CORBA) allow processes to share processes and data ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required