8. Software Development Security Flashcards
Which IP protocol is secure and how?
IPv6 is inherently secure, as it uses IP Sec. IP Sec is a framework for traffic including the support for encryption, authentication, authorization and integrity.
What are the software development methodologies?
- Waterfall
- Prototyping
- Spiral
- Agile
Define Waterfall
Software development methodology.
Phase based approach. Best for small projects
Pros: define before code
Cons: adjusting scope during project can kill it.
Define Prototyping
A software development methodology.
A cyclical approach to development. Makes a working model and expand off of it to fit what customer wants.
Pros: users interact with model and give feedback
Cons: tendency for superficial analysis
Define Spiral
A software development methodology
Combo of waterfall and prototyping. Good for large projects.
Pros: a usable software is produced early in the cycle.
Cons: costly. Risk analysis requires highly specific expertise.
Define Agile
A software development methodology
Current popular model. Have new objective every ~2 weeks
Pros: fewer defects, greater flexibility instant feedback.
Cons: less documentation, less focus on system design. Harder to track.
Define distributed computing
An architecture style.
- Client-server. Ie. thin/fat clients.
- Peer-to-peer. Ie. file sharing systems.
Define Service Orientated Architecture
An architecture and a vision on how heterogeneous applications should be developed and integrated into the enterprise.
Share a formal contract.
Reusable, autonomous, stateless, discoverable.
Define Rich Internet Applications
An architecture style.
Web applications
What are main threats of rich internet applications?
client side: XSS and CSRF
Server side: code injection and aggregation
What is polyinstatiation?
Lying.
What is aggregation?
Collecting of information.
Define ubiquitous computing.
Wireless networking.
Ie. RFID, NFC, and LBS (location based services)
Define monitoring
Validation of compliance to regulations and other governance requirements.
Demonstrates due diligence and due care on the part of the organization towards its shareholders.
What are the characteristics of good metrics?
Consistency Quantitative Objectivity Relevance Inexpensive
Define auditing
Important detective controls that can be used to correlate information after an event.
Used to ensure policies are being followed and are effective.
What is Code injection?
An OWASP Vulnerability
Injection flaws in code that occur when untrusted data is sent to an interpreter as part of a command or quart.
What is Broken Authentication & Session Management?
An OWASP Vulnerability
Application functions related to authentication that are not implemented correctly and allow attackers to compromise information to assume others identities.
What is XSS?
An OWASP Vulnerability
Cross Site Scripting
Whenever an application takes untrusted data and sends it to a web browser without proper validation.