Software Development Security (ch 20-21) Flashcards

1
Q

What are the stages of the Software Capability Maturity Model?

A
Level 1: Initial (disorganized, little or no defined process)
Level 2: Repeatable
Level 3: Defined
Level 4: Managed
Level 5: Optimizing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the stages of the IDEAL model?

A
Initiating
Diagnosing
Establishing
Acting
Learning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What character, if eliminated from all web form input, would prevent the execution of many cross-site scripting attacks?

A

Cross-site scripting attacks pass the tag to a browser. Preventing the use of the < character blocks most attempts to perform these attacks, although they are still possible when using obfuscation techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common programmer-generated security flaw?

A

By far, the buffer overflow is the most common, and most avoidable, programmer-generated vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly