Software Development Security (DEV) Flashcards
ACID test
set of best practices for programmers to seek in all application or database design: Atomicity, Consistency, Isolation, Durability
Active X
Authenticode, relies on digital signatures, annoying dialogs people click away
Application Programming Interface
a library of commands maintained by a system for other programs to use, provides consistency and integrity for the programs
Assembler
is the tool that converts a high level language into machine language
Assembler - DEV
Converts machine-code into binary machine instructions. Translate assembly language into machine language.
Assembly Code
low-level programming language with a few simple operations this code is harder to maintain, less readable, and has the potential to be substantially longer
Atomicity
indivisible, data field must contain only one value that either all transactions take place or none do
Backdoor
Program installed by an attacker to enable him to come back on a later date without going through the proper authorization channels, maintenance hook for developers sometimes
Behavior
Results exhibited by an object in response to a msg
Big Endian
Most significant byte is stored first. SPARC uses this architecture.
Blue Screen of Death
When a Windows system experiences a dangerous failure and enters a full secure state (reboot)
Boot sector
Moves or overwrites the boot sector with the virus code
boot sector infector
Attacks the MBR - the portion of bootable media that the computer uses to load the operating system during the boot process. MBR viruses store the majority of their code on another portion of the storage media
Botnet
organized group of compromised computers
Buffer
an area of memory allocated with a fixed size. It is commonly used as a temporary holding zone when data is transferred between two devices that are not operating at the same speed or workload.
Buffer Overflow
Occurs when an area that has been allocated a specific storage space has more data copied to it than it can handle. Two classes include heap and stack overflow.
Byte Code
program code that is in between the high level language code understood by humans and machine code read by computers.
Candidate Key
An attribute that is a unique identifier within a given table, one is chosen to be the primary and the others are alternate. Subset of attributes that can be used to uniquely identify any record in a table. No two records in the same table will ever contain the same values for all attributes. Each table may have one or more, which are chosen from column headings.
CASE
Tool for development, if concerned about security
Change Management Process
a business managers and software engineer’s process to protect the organization from development-related issues. Has three components: Request, Change, and Release Control
Checkpoint
part of a transaction control for a database which informs the database of the last recorded transaction
Class
OOP concept of a template that consist of attributes and behaviors
compiler
converts source code to an executable
Cleanroom
Write code correctly first time, quality thru design