Software Development Security Flashcards
Object-oriented programming typically uses ——–design
bottom-up
Freeware is “free as in beer” (gratis) software
free to use
Shareware is fully functional proprietary software that may be initially used free of charge.
Shareware for a specific period of time specified by the license
Crippleware
s partially functioning proprietary software, often with key features disabled.
The most prevalent of open source licenses
GPL
Waterfall Model
it cannot go back up
The Sashimi Model
based on (and a reaction to) the Waterfall Model.
Agile methods include
Scrum and Extreme Programming (XP).
Extreme Programming (XP) is an Agile development method that uses pairs of programmers who work off a detailed specification. There is a high level of customer involvement.
Extreme Programming improves a software project in five essential ways, communication, simplicity, feedback, respect, and courage
The Spiral Model
The Spiral Model is a software development model designed to control risk.
Rapid Application Development (RAD)
The goal of RAD is quickly meeting the business need of the system; technical concerns are secondary. The customer is heavily involved in the process.
The Systems Development Life Cycle
initiation, development/acquisition, implementation, operation, and disposal
An Integrated Product Team (IPT)
is a customer-focused group that focuses on the entire lifecycle of a project:
Configuration Change Control
process for managing updates to the baseline configurations for the configuration items; and
Aggregation attack
is a mathematical attack where an attacker aggregates details at a lower classification to determine information at a higher classification.
Inference
but the attacker must logically deduce missing details: unlike aggregation, a mystery must be solved.
tuple
a row is a database record,
Referential integrity
means that every foreign key in a secondary table matches a primary key in the parent table
Semantic integrity
each attribute (column) value is consistent with the attribute data type.
Entity integrity
means each tuple has a unique primary key that is not null.
Database normalization
seeks to make the data in a database table logically concise, organized, and consistent.
data dictionary
description of the database tables
database schema
it describes the attributes and values of the database tables.
Data Definition Language (DDL)
DDL is used to create, modify, and delete tables.