Secure Software Architecture Glossary Flashcards

(21 cards)

1
Q

Minimising cyber attacks and vulnerabilities

A

Using strong passwords, updating your software, thinking before you click on suspicious links, and turning on multi-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data protection

A

Protecting data from unauthorized access, use, disclosure, modification, or destruction. This involves implementing measures like encryption, access controls, and intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Determining specifications

A

Identifying and defining security requirements, conducting threat modeling, and establishing secure design principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Design

A

Designing systems with security considerations integrated from the outset, rather than as an afterthought.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Development

A

Focuses on integrating security considerations throughout the entire software development lifecycle (SDLC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Integration

A

Embedding security measures and considerations throughout the entire software development lifecycle and within the system’s architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Testing and debugging

A

In contrast, debugging is the process of correcting or removing bugs or errors found in the testing process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Installation

A

Implementing strategies and solutions to protect software from unauthorized access, modification, or misuse during the installation process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Maintenance

A

Ongoing activities to ensure software remains secure after initial deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

Ensures that sensitive information is accessible only to authorized individuals, preventing unauthorized access, use, or disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity

A

Ensures data and systems remain accurate, trustworthy, and free from unauthorized modification throughout their lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Availability

A

Ensures authorized users can access and use resources when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication

A

The process of verifying the identity of a user, device, or service before granting access to resources or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authorisation

A

The process of verifying the identity of a user, device, or service before granting access to resources or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Accountability

A

Ensuring that actions within a system can be traced back to specific individuals or entities, enabling them to be held responsible for their actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Proactive not reactive approach

A

Proactive security hardening is a preventative approach implemented before threats materialize, whereas reactive security is a response to an ongoing or past security incident.

17
Q

Embed privacy into design

A

Prioritize privacy considerations from the outset of the development lifecycle.

18
Q

Respect for user privacy

A

Prioritizing user data protection and control throughout the software development lifecycle.

19
Q

Broken authentication and session management

A

Critical security vulnerabilities in software architecture, particularly in web applications.

20
Q

cross-site request forgery (csrf)

A

Cross-Site Request Forgery (CSRF) is a type of web security vulnerability where an attacker tricks a user into performing unwanted actions on a website where they are already authenticated

21
Q

Cross-site scripting (XSS)

A

Cross-site scripting (XSS) is a web security vulnerability that allows attackers to inject malicious scripts into otherwise trusted websites.