Domain 8 Test Notes Flashcards
Concepts I need to understand (47 cards)
Scripted Transactions with known expected results. May be a part of DAST(Dynamic Application Security Testing)
Synthetic Transactions
Improving computer algorithms (rules and guidelines) by experience.
Machine Learning
Gives machines the ability to do things that a human can do better or allow a machine to perform tasks we previously thought required human intelligence
Artificial Intelligence
A collection or ledger of records, transactions, operations, or other events that are verified using hashing, timestamps, and transaction data
Blockchain
Is when every foreign key in a secondary table matches a primary key in the parent table. It is broken if not all foreign keys match the primary key
Referential Integrity
Each attribute value is consistent with the attribute data type
Semantic Integrity
Each row (tuple) has a unique primary value that is not null
Entity Integrity
is a relational database model that refers to four key properties that ensure reliable processing of database transactions. These properties together ensure data integrity and reliability in database systems.
ACID Model
All or nothing, if any part of the transaction fails, the entire transaction fails
Atomicity
The database must be consistent with the rules before and after the transaction
Consistency
A transaction must be completed before another transaction can modify the same data
Isolation
Once transactions are committed to the database, they must be preserved
Durability
A framework designed to scale agile practices across an entire enterprise efficiently and effectively. Adds the necessary layers to make Agile work in a large enterprise level context
Scaled Agile Framework (SAFe)
Emphasis on delivering value through respect for people, culture, flow optimization, innovation, and relentless improvement.
Lean Agile Principle (SAFe Principle)
Customer centric approach, releasing a continuous flow of valuable products and services
Agile Product Delivery (SAFe Principle)
Focus on building and sustaining large applications, networks, and systems needed for a large enterprise to function
Enterprise Solution Delivery (SAFe Principle)
Leaders’ understand and commitment to implementing Lean and Agile principles
Lean Leadership (SAFe Principle)
A prepared SQL statement that allows user input to be passed into the statement as carefully defined variables that do not allow the insertion of code. Can protect applications against injection attacks.
Parameterized Queries
A software solution that uses AI to automatically respond to some security incidents.
Security Orchestration, Automation, Response (SOAR)
Documents and checklist that define the process for verifying and responding to a specific type of security incident
Playbook
the implementation of a playbook’s data and processes into an automated tool within the SOAR platform.
Runbook
Sophisticated attacks are likely affiliated with government agencies. Often have access to zero day exploits that are not known to software vendors.
Advanced Persistent Threat (APT)
Provides a framework of process descriptions for describing the life cycle of systems created by humans. It defines a set of processes and associated terminology from an engineering viewpoint.
ISO/IEC/IEEE 15288
provides a catalogue of architectural and design principles that can be used in the development of secure products, systems and applications together with guidance on how to use those principles effectively.
ISO/IEC 19249