Domain 8. Software Development security Flashcards
Aggregation
When a user does not have the clearance or permission to access specific information, but she does have the permission to access components of this information. She can then figure out the rest and obtain restricted information.
Inference
Ability to derive information that is not explicitly available
Polyinstatiation
Multiple instances of information depending of the clearence
Primary key
Unique identifier for each record
Normalization
Process of removing duplicates and ensuring that each attribute only describes the primary key
Entity integrity
PK field cant be null
Cardinality
Number of rows in the relations
Degree
Number of columns in the relations
Attribute
column
Tuple
Collection of attributes (raw)
ACID
Atomicity
Consistency
Isolation
Durability
DB Checkpoint
Known good point from which the DB can recover
DB Savepoint
Temporary backup that can be configured based on variables (time interval, number of transactions, etc)
DB Cell suppression
Technique used to hide specific cells
DB view
used to permit, allow or restrict users from viewing specific fields or records
External consistency
External consistency ensures that the data stored in the database is consistent with the real world.
Decision Support System (DSS)
The Decision Support System (DSS) is what some of the books are referring to as the Delphi Method or Delphi Technique
Acceptance
confirms that users’ needs have been met by the supplied solution
Accreditation
is the formal acceptance of security, adequacy, authorization for operation and acceptance of existing risk. Accreditation is the formal declaration by a Designated Approving Authority (DAA) that an IS is approved to operate in a particular security mode using a prescribed set of safeguards to an acceptable level of risk.
Certification
is the formal testing of security safeguards and assurance is the degree of confidence that the implemented security measures work as intended. The certification is a Comprehensive evaluation of the technical and nontechnical security features of an IS and other safeguards, made in support of the accreditation process, to establish the extent to which a particular design and implementation meets a set of specified security requirements.
Assurance
Assurance is the descriptions of the measures taken during development and evaluation of the product to assure compliance with the claimed security functionality. For example, an evaluation may require that all source code is kept in a change management system, or that full functional testing is performed. The Common Criteria provides a catalogue of these, and the requirements may vary from one evaluation to the next. The requirements for particular targets or types of products are documented in the Security Targets (ST) and Protection Profiles (PP), respectively.
Stealth viruses
accept incoming scan attempts by the antivirus engine and forwards them to the original file which of course, is normal and uninfected. (And therefore not a threat.)
Shell Virus
Shell viruses create a “shell” around the compromised file and intercept calls to that program. It may pass the commands along to the compromised program and let the output from that program proceed but it can overwrite or alter the output.
Unit Testing
Unit testing is the testing of an individual program or module. Unit testing uses set of test cases that focus on control structure of procedural design. These tests ensures internal operation of the programs according to the specification.