lecture 7: security and controls Flashcards
(16 cards)
system controls
mechanisms and procedures that are built into a system to safeguard the system and the information within
integrity controls
a control that rejects invalid data, inputs, prevented unauthorized outputs, and protects data against accidental or malicious attacks
security controls
are less application specific but its part of the operating system and network
input controls
- value limit control
- completeness control
- data validation control
- field combination control
output controls
- physical access to printers and display devices
- discarded data (shredding)
- labeling printed output to identify and verify source
what is security controls
a control that protects the assets of an organization
objective of security controls
- maintain a stable and functioning operating environment for users
- protect information and transactions during transmission on the internet and other insecure environments
access control
- controlling who accesses the data and their position and level
- privileged: senior, manager, administrator
- registered: system developer, supplier
- unregistered: customers, employees
- unauthorized: people from competitor company, former employees, hackers
symmetric key encryptions
- person 1 and person 2 share the same secret key which will encrypt and decrypt data
asymmetric key encryptions
- person 1 and person 2 share different secret keys which will encrypt and decrypt data
public key encryptions
- uses public key for ENCRYPTION and a secret key for DECRYPTION
digital certificate
- authenticates web credentials and lets the recipient know that the data is from a trusted source
- it is issued by the certificate authority (CA)
describe OOA
OOA helps in giving a better understanding in the problem we are trying to solve.
It deals with defining the problem, where the models used focus on the understanding of the objectives and defining the functions that will lead to the solution.
Through OOA, we can know the limits, tradeoffs and requirements when discussing how the problem can be overcome.
describe OOD
OOD deals with how the solution is implemented and how it is maintained.
Through OOD we can understand how the solution will flow between the varying users.
how to extend and integrate requirement models
- use case diagrams
- use case descriptions
- activity diagram
- system sequence diagram
- domain model class diagram
- ERD
steps to SSD
1) identify input message
2) describe the message from the external actor to the system
(verb-noun e.g.: addItem)
3) identify any conditions for the input (loop, alternate, optional)
4) identify and add output message from system to actor
(dashed line)