Fundamentals & Requirements Flashcards

(5 cards)

1
Q

what is Translating User Requirements into Secure Specs

A

Converting user needs into specific, secure system requirements

Example – Login:
Requirement: “Users must log in”
Spec: Use multi-factor authentication and secure password hashing
Example – Payment:
Requirement: “Users can make payments”
Spec: Use TLS encryption, PCI-DSS compliance, tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

User-Centered Security Testing

A

Focuses on how users interact with security features.

4 Key Questions:
Can users see the security features?
Are they easy to understand?
Are errors easy to make?
Are alerts and messages clear?
Example: A session timeout warning that users understand and act on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

security & usability Role of User Feedback

A

What it is: Gathering input from users to improve security & usability.
Examples:
Password rules too strict → users bypass security → rules improved
Confusing error messages → rewritten for clarity and protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the CIA Triad in Secure Coding

A

Confidentiality: Prevent unauthorized access (e.g., encryption)
Integrity: Prevent tampering (e.g., hashing, checksums)
Availability: Ensure systems stay up (e.g., backups, failover)
Why: CIA guides secure software architecture and coding practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to Secure Debugging Practices

A

Avoid logging sensitive data
E.g., never log passwords or tokens
Disable debug tools in production
E.g., remove Django debug toolbar
Conduct security-focused code reviews
E.g., check for access control flaws, not just bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly