DEV Flashcards
set of best practices for programmers to seek in all application or database design: Atomicity, Consistency, Isolation, Durability
ACID test
Authenticode, relies on digital signatures, annoying dialogs people click away
Active X
a library of commands maintained by a system for other programs to use, provides consistency and integrity for the programs
Application Programming Interface
is the tool that converts a high level language into machine language
Assembler
Converts machine-code into binary machine instructions. Translate assembly language into machine language.
Assembler - DEV
low-level programming language with a few simple operations this code is harder to maintain, less readable, and has the potential to be substantially longer
Assembly Code
indivisible, data field must contain only one value that either all transactions take place or none do
Atomicity
Program installed by an attacker to enable him to come back on a later date without going through the proper authorization channels, maintenance hook for developers sometimes
Backdoor
Results exhibited by an object in response to a msg
Behavior
Most significant byte is stored first. SPARC uses this architecture.
Big Endian
When a Windows system experiences a dangerous failure and enters a full secure state (reboot)
Blue Screen of Death
Moves or overwrites the boot sector with the virus code
Boot sector
Attacks the MBR - the portion of bootable media that the computer uses to load the operating system during the boot process. MBR viruses store the majority of their code on another portion of the storage media
boot sector infector
organized group of compromised computers
Botnet
an area of memory allocated with a fixed size. It is commonly used as a temporary holding zone when data is transferred between two devices that are not operating at the same speed or workload.
Buffer
Occurs when an area that has been allocated a specific storage space has more data copied to it than it can handle. Two classes include heap and stack overflow.
Buffer Overflow
program code that is in between the high level language code understood by humans and machine code read by computers.
Byte Code
An attribute that is a unique identifier within a given table, one is chosen to be the primary and the others are alternate. Subset of attributes that can be used to uniquely identify any record in a table. No two records in the same table will ever contain the same values for all attributes. Each table may have one or more, which are chosen from column headings.
Candidate Key
Tool for development, if concerned about security
CASE
a business managers and software engineer’s process to protect the organization from development-related issues. Has three components: Request, Change, and Release Control
Change Management Process
part of a transaction control for a database which informs the database of the last recorded transaction
Checkpoint
OOP concept of a template that consist of attributes and behaviors
Class
converts source code to an executable
compiler
Write code correctly first time, quality thru design
Cleanroom