It’s common for people to be confused by data abstraction and encapsulation and treat the concept of abstraction as encapsulation or information hiding. That’s not the case. The following definitions come from ISO/IEC/IEEE 24765:2017 Systems and software engineering — Vocabulary.
process of extracting the essential characteristics of data by defining data types and their associated functional characteristics and disregarding representation details
result of the process in (1)
software development technique that consists of isolating a system function or a set of data and operations on those data within a module and providing precise specifications for the module
concept that access to the names, meanings, and values of the responsibilities of a class is entirely separated from access to their realization [IEEE 1320.2-1998 (R2004) IEEE Standard for Conceptual Modeling Language Syntax and Semantics for IDEF1X97 (IDEFobject), 3.1.54]
the idea that a module has an outside that is distinct from its inside, that it has an external interface and an internal implementation
software development technique in which each module’s interfaces reveal as little as possible about the module’s inner workings and other modules are prevented from using information about the module that is not in the module’s interface specification
containment of a design or implementation decision in a single module so that the decision is hidden from other modules
I build a multi-target .NET project, DomainModel, that supports .NET framework and .NET Core and publish the Windows Form Application as the client using Microsoft ClickOnce requiring the shared DomainModel be strongly-named. However, it doesn’t make sense on a docker node in Azure.
As a development organization, your company initiated a security champion program based on the Software Assurance Maturity Model (SAMM)to increase the effectiveness and efficiency of application security and compliance and to strengthen the relationship between various teams and Information Security. Which of the following is the best arrange for the security champion? (Wentz QOTD) A. Establish a security champion position reporting to CEO directly B. Establish a security champion position reporting to CISO directly C. Assign a developer in each project to serve as the security champion role D. Assign a functional manager with position power to serve as the security champion role
As a security professional, you are concerned with acquired products or services going end-of-life or end-of-service. Which of the following is the most crucial reason? (Wentz QOTD) A. Risk exposure increases. B. Maintenance costs get higher. C. System availability can be impacted. D. Vulnerabilities remain open and unpatched.
WUSON Practice Field for Wentz Wu (a CISSP test bank) relies on the identity provider, Auth0, for authentication. When a user logs into the system for the first time, the system will create an account on Auth0 automatically. However, a user needs some roles to get access to the test bank.
As a risk management professional, you are evaluating the organizational risk management program using the risk maturity model. Which of the following is incorrect? (Wentz QOTD) A. The term “maturity” refers to how well the risk management processes are performed. B. A maturity model shall define five maturity levels. C. Optimizing or optimized typically refers to the level of the best maturity. D. Risk management in certain contexts can be a temporary endeavor.
As a risk management professional, you are calculating annualized loss expectancy based on input parameters such as asset value, exposure factor, single loss expectancy, and the annual rate of occurrence. Which of the following is the end purpose? (Wentz QOTD) A. Qualitative risk analysis B. Quantitative risk analysis C. Risk prioritization D. Risk evaluation
You are identifying, analyzing, and evaluating information risk focusing on the likelihood and impact of threats. Which of the following is the last tool or technique you may use in the process? (Wentz QOTD) A. Risk heat map B. Asset valuation C. Benefits analysis D. Risk exposure determination