Mod 3 Flashcards

(51 cards)

1
Q

Define DevOps

A

a collaborative effort to improve the qualtiy and velocity of the service lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The speed at which teams work across the life cycle is?

A

Velocity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the responsibilities of Developers?

A

Plan
Code
Build
Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the responsibilities of Operations?

A

Release
Deploy
Operate
Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the mindsets of Dev and Ops

A

Devs - want change
Ops - want stability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 pillars DevOps rely on to achieve success?

A

Culture,
Automation,
Measurement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 3 priorities for developing a DevOps culture?

A

Collaborative,
Transparent,
Change Oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Between Dev and Ops, who’s more focused on the earlier phases of the lifecycle?

A

Dev

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Between Dev and Ops, who’s more focused on the later phases of the lifecycle?

A

Ops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Development success is measaured by…

A

rate of change,
lines of code,
number of commits,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Operations success is measured by…

A

service uptime & performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Between Dev and Ops, who is responsible for service delivery?

A

Both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the key difference between DevOps and DevSecOps

A

DevSecOps says to build security in, not to leave security as an after-the fact stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define cyber security

A

the prcatice of defending and protecting data from malicious attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The 4 types of security that typically fall under cyber security are:

A

Network security
Application security
Information security
Operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application security focuses on…

A

keeping sofware and devices free of threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Information security focuses on…

A

protecting the integrity and privacy of data in storage and transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Operational security focues on…

A

training end users on operating the system, as well as handling and protecting data assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define network security

A

the process of taking preventative measures to protect the underlying networking infrastrucutre from unauthorized access and/or abuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the goal of network security?

A

to protect data from point to point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define application security

A

the process of making apps more secure by enhancing their security

22
Q

Define information security

A

protecting data and information at rest and in transit

23
Q

Define operational security

A

protecting the system being used in operation

24
Q

List 4 cyber security concepts

A

Defense in Depth
Strong Authentication
Device Hardening
Reducing Attack Surface

25
Name a method that improves communication and deployment of sofware between Dev and Ops.
Continuous Integration and Continuous Deployment (CI/CD)
26
The security concept that "adds layered security" is...
defense in depth.
27
In other forms of software engineering, shutting down a system to avoid failure is a good idea. Why is it not a good idea during a security attack?
shutting down the system may be the goal of the attack as a shut down or reboot can give the attacker total control of a system
28
Name the 9 different types of security requirements from notes
Identification reqs Authentication & Authorization reqs Immunity reqs Integrity reqs Intrusion Detection reqs Non-repudiation reqs Privacy reqs Security Auditing reqs System Maintenance Security reqs
29
Instances of threats to a system are known as...
misuse cases
30
Who are the two agents in a misuse case?
Actor and Attacker
31
Type of threat where the attacker gains access to an asset
Interception threat
32
Type of threat where the attacker makes part of a system unavailable
Interruption threat
33
Type of threat where a system asset is tampered with
Modification threat
34
Type of threat where false information is added to a system
Fabrication threat
35
What separates a security user story from a regular user story?
In most cases user stories are malleable, discardable, and pertains only to the application at hand. Security user stories are not like this. Security user stories should not be modified. They should not be discarded. They can be re-used.
36
What's the hardest part of DevOps?
creating a shared culture between Dev and Ops
37
Data that travels over a network of some kind that must be secured is known as...
data in transit
38
Describe Defense in Depth
multiple layers of security controls
39
Describe Device Hardening
reduce internal and external attack vectors
40
What's the benefit of String Authentication?
degrades the adversary's ability to maneuver on information networks
41
Software Security Requirements are difficult to capture because compared to other forms of software systems engineering, an attacker...
has knowlege of system weaknesses, can probe controls over time to discover vulnerabilities, can conceal the cause of a system failure, may actually want you to shut the system down
42
DevOps Qualification: Documentation correct is related to what type of task?
Installation
43
DevOps Qualification: Installs on target environment(s) is related to what type of task?
Installation
44
DevOps Qualification: Functions according to operation specs in selected environments is related to what type of task?
Operational
45
DevOps Qualification: Performs consistently for day-to-day routine is related to what type of task?
Performance
46
What type of threat is a brute-force password guessing program?
Fabrication threat
47
What type of threat is a denial of service attack?
Interruption threat
48
What type of threat is a trojan horse attack (alterning a common operating system tool to produce an attack)?
Modification threat
49
What type of threat is a phising attack?
Fabrication threat
50
Best practices for employing user stories for security include:
emplying themes to group cross-cutting stories, keeping track of security debt, write stories in the affirmative, create or reuse libraries of common security user stories
51
What's not a goal of the Information Security Forum (ISF)?
helping to write ISO standards