2.3.1 Defensive design Flashcards

1
Q

What does anticipating misuse include?

A

Users tyring to access parts of the program they should not
Users intentionally trying to break or crash a system
Accidental misuse and key presses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can authentication be checked?

A

Use of passwords to prevent unauthorised access
Specific uses can be given limited functionality
Additional security questions can be asked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can we check input validation?

A

Comparing against defined responses
Allowing only specific data types
Is the data entered outside of an expected range?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you keep a program well maintained?

A

Comments
Indentation
Naming conventions
Sub-programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are comments?

A

Programmer notes to describe functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is indentation?

A

seperates statements into groups and highlights features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is naming conventions?

A

Ensuring variable names are sensible and purposeful, such as firstName or productCode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are sub-programs?

A

use these to avoid repetition and when they will benefit the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly