2.3 Summarize secure application development, deployment, and automation conpcepts. Flashcards

1
Q

This must be configured and segmented to properly implement staging. This often requires at least four main network divisions: development, test, staging, and production.

A

Secure IT environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where new software code is being crafted by on-staff programmers and developers. For some organizations, this might also be where custom-built hardware is being created.

A

Development (Environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An essential part to the security requirements of every modern organization. A key element of a software development program is this and code review.

A

Test (Environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where new equipment or code, whether developed in-house or obtained from external vendors, is configured to be in compliance with the company’s security policy and configuration baseline. Once a system or software goes through this process, it can be moved to the test network for evaluation. After the system has passed evaluation, it can be deployed into the production network.

A

Staging (Environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The network where the everyday business tasks and work processes are accomplished. It is also known as the operations network. It should only be operating on equipment and systems that have been properly staged and tested.

A

Production (Environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An evaluation process employed by many organizations to ensure that newly integrated hardware and software do not reduce performance or efficiency nor introduce any unexpected security issues.

A

Quality Assurance (Environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A new IT movement in which many elements and functions of IT management are being integrated into a single automated solution. It typically consists of IT development, operations, security, and quality assurance.

A

Secure DevOps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Used to ensure that sufficient resources are available to support and maintain a system, software, or solution. Also known as preallocation.

A

Provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can focus on streamlining and fine-tuning resource allocation to existing systems for a more efficient distribution of resources.

A

Deprovisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Accomplished through the cryptographic concept of hashing.

A

Integrity measurement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Those efforts designed to implement security into software as it’s being developed.

A

Secure coding concepts/ techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A database programming and management technique used to reduce redundancy.

A

Normalization (secure coding)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A subroutine or software module that can be called upon or accessed by applications interacting with an RDBMS.

A

Stored procedures (secure coding)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The coding practice of crafting code specifically to be difficult for other programmers to decipher.

A

Obfuscation/ camouflage (secure coding)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The inclusion of preexisting code in a new program. It can be a way to quicken the development process.

A

Code reuse (secure coding)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dead code is any section of software that is executed but the output or result of the execution is not used by any other process.

A

Dead code (secure coding)

17
Q

Suited for protecting a system against input submitted by a malicious user. It should include a check for input length, a filter for known scriptable or malicious content (such as SQL commands or script calls), and a metacharacter filter.

A

Server-side validation (secure coding)

18
Q

Focuses on providing better responses or feedback to the typical user. It can be used to indicate whether input meets certain requirements, such as length, value, content, and so on.

A

Client-side validation (secure coding)

19
Q

Includes software management techniques such as preallocating memory buffers but also limiting the input sent to those buffers. Including input limit checks is part of secure coding practices.

A

Memory management (secure coding)

20
Q

Essential tools for a programmer that allows them to use preexisting code can allow programmers to focus on their custom code and logic.

A

Third-party libraries and SDKs (secure coding)

21
Q

When software does not adequately protect the data it processes. Programmers need to include authorization, authentication, and encryption schemes in their products to protect against this.

A

Data exposure (secure coding)

22
Q

A nonprofit security project focusing on improving security for online or web-based applications, mobile device applications, and IoT equipment.

A

Open Web Application Security Project (OWASP)

23
Q

The use of several high-level languages more similar to human languages that aid people in the crafting of new software.

A

Software diversity

24
Q

Used to convert a high-level language or human-readable source code into machine language or binary executable code for execution.

A

Compiler

25
Q

Shorthand to reference binary code or machine language. It is usually code that is ready to execute on a CPU.

A

Binary

26
Q

The control of systems on a regular scheduled, periodic, or triggered basis that does not require manual hands-on interaction. It is often critical to a resilient security infrastructure.

A

Automation

27
Q

The crafting of a file of individual lines of commands that are executed one after another. These can be set to launch on a schedule or based on a triggering event.

A

Scripting

28
Q

These ensure that a specific series of steps or activities are performed in the correct order each and every time. This helps ensure consistency of results, which in turn establishes consistent security.

A

Automated courses of action (automation/scripting)

29
Q

Stems from the need to have user accountability through the use of user access reviews.

A

Continuous monitoring (automation/scripting)

30
Q

Necessary to maintain integrity of automation.

A

Continuous validation (automation/scripting)

31
Q

The approach to ensure that automated tools, automated testing, and manual injection of security elements are included throughout the process of product development.

A

Continuous integration (automation/scripting)

32
Q

The release of updates and changes to customers or production as they are made to the scripts and code of automation.

A

Continuous delivery (automation/scripting)

33
Q

An extension of continuous delivery, except that the implementation of new code occurs automatically into production.

A

Continuous deployment (automation/scripting)

34
Q

The ability of a system to adapt to workload changes by allocating or provisioning resources in an automatic responsive manner.

A

Elasticity

35
Q

The ability of a system to handle an ever-increasing level or load of work. It can also be the potential for a system to be expanded to handle or accommodate future growth.

A

Scalability

36
Q

The management of the progress of changes in software code. The goal is to ensure that only final version of products are released to the market.

A

Version Control