Chaptet 10 - Software Security Flashcards
(132 cards)
Initiation
The first step, the idea, the choosing a vendor vs homebrew, the project level risk assessment .. Will this work?
Software development lifecycle
Initiation Acquisition Implementation Operation/Maintenance Disposal
Certification vs accreditation
Certification is the technical testing
Accreditation is the formal authorization
Statement of work
Outlines the work necessary to work with a customer on a project
Scope creep
When the purpose of a project shifts during the processes and additional steps are added
Work breakdown structure
A project management tool used to group sets of activities logically to keep focused
Privacy risk assessment
A software risk assessment to discover vulnerabilities
Privacy impact rating
This is the level of impact per item on the privacy risk assessment, generally rated in P1 to P3
What three models of software design are there?
Informational
Functional
Behavioral
Attack surface analysis
Aims to reduce the amount of code accessible by untrusted users
Threat modeling
Model used to detect threat vectors using a threat analysis tree
Threat analysis and modeling tool
Computer aided software engineering CASE
Tools like dreamweaver and visual studio
Where can I find a list of common code vulnerabilities?
Cwe.mitre.org/top25/#Listing
Static analysis
Automated code review
Unit testing
Testing a module or chunk of code
What are the key components of a test phase?
Test needs to mirror production
Pen testing is necessary
Platform testing
Testing types
Unit testing
Integration testing
Acceptance testing
Regression testing
Fuzzing
Throwing random data at a solution to see what errors occur in order to detect vulnerabilities
Dynamic analysis
Watching the code stream and sub level messages to ensure code is running correctly
Maintenance hook
Code that is used for troubleshooting low level code and should be removed in prod
Verification vs validation
Verification determines accuracy to spec
Validation determines of the product solved the intended problem
Zero day vulnerability
Vulnerability that does not have a fix yet
Wasc
Web application security consortium is a web organization that tracks attacks on the Internet
Owasp is the open standard for this
ISO 27034
Software development guidelines