Domain 8: Software Development Security Flashcards

1
Q

Message

A

communication to or input of an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Method

A

internal code that defines the actions an object performs in response to a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Behavior

A

results or output exhibited by an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Class

A

collection of the common methods from a set of objects that defines the behavior of those objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Instance

A

example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Inheritance

A

methods from a class are inherited from a subclass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Delegation

A

forwarding of a request by an object to another object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Polymorphism

A

the characteristic of an object that allows it to respond with different behaviors to the same message or method because of changes in external conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cohesion

A

strength of the relationship between the purposes of the methods within the same class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Coupling

A

level of interaction between objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assurance procedures

A

formalized processes by which trust is built into the life cycle of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Input Validation

A

verifies that the values provided by the user match the programmers expectation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Should Input Validation occur on the Server or Client side?

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Conceptual Defenition

A

create the basic concept statement for a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Functional Requirements Determination

A

specific system functionalities are listed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Control Specification Development

A

analyze the system from a security perspective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Code Review Walk Through

A

look for logical or security flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Waterfall Model

A

step by step life cycle model, can only go back one phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Spiral Model

A

multiple iterations of a waterfall style process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Agile Software Development

A

iterative software development process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Highest Priority in the Agile Manifesto

A

Satisfy the customer through early and continuous delivery of valuable software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SW-CMM

A

SW Capability Maturity Model - all orgs move through a variety of maturity phases in sequential fashion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IDEAL Model

A

Initiating, Diagnosing, Establishing, Acting, Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SW-CMM Levels

A

Initiating, repeatable, Defined, Managed, Optimized

25
White-box Testing
examines the internal logical structures of a program and steps through the code line by line
26
Black-box Testing
examines from a user perspective by providing different inputs
27
Gray-Box Testing
most popular, combines both testing forms
28
Code Repositories
a central storage point for developers to place their source code
29
Hierarchical Database
one to many - think of an org chart
30
Distributed Databased
data in more than one database but all logically connected
31
Relational Databases
flat, two-dimensional tables
32
Fields (Relational Databases)
attributes
33
Tuple (Relational Databases)
record
34
Cardinality (Relational Databases)
number of rows
35
Degree (Relational Databases)
number of columns
36
Domain (Relational Databases)
set of allowable values
37
Candidate Keys
subset of attributes that can be used to uniquely identify any record in a table
38
Primary Keys
selected from the set of candidate keys for a table to be used to uniquely identify the records in a table
39
Foreign Key
enforce relationships between two tables
40
What are the 4 required characteristics of all database transactions?
Atomicity, Consistency, Isolation, Durability
41
Atomicity
all or nothing affair
42
Consistency
transactions must operate in an environment that is consistent with all of the database's rules
43
Isolation
transactions operate separately from each other
44
Durability
transactions are preserved once they are committed to the database
45
Concurrency
edit control - ensures that info in the database is always correct (I&A is protected)
46
DSS
Decision Support System - help desk
47
Virus
spreads from system to system, must have a host and does not self propogate
48
Master Boot Record Viruses
virus that attacks the bootable media
49
File Infector Viruses
.exe and .com extensions
50
Macro Viruses
viruses in VBA
51
Service Injection Viruses
inject themselves into trusted runtime processes of the OS
52
Multiparite Viruses
use more than one propogation technique
53
Stealth Viruses
hide themselves by tampering with the OS
54
Polymorphic Viruses
modify their own code
55
Encrypted Viruses
use cryptographic techniques to avoid detection
56
Worms
propagate themselves without human intervention
57
Lost Update
One transaction writes a value to the database that overwrites a value needed by transactions that have earlier precendence, causing those transactions to read an incorrect value
58
Dirty Read
One transaction reads a value from a database that was written by another transaction that did not commit
59
Incorrect Summaries
One transaction is using an aggregate function while a second is making modifications