Applications Security Flashcards
Aggregation Database Threat
Access of part of classified information by unauthorized users.
Basic Constructive Cost Model(COCOMO)
Determines the total number of months a project will take to complete.
Bypass Attacks
Going around security mechanisms to access unauthorized information.
Common Object Request Broker Architecture(CORBA)
Allows all components to process requests and responses from each other.
Component Object Model(COM)
Addresses software components and their functions. Functions are not dependent on rules of language
Concurrency Database Threat
Simultaneous activity on a single point of data
Configuration Management
Is a mechanism that monitors the entire Software Life Cycle. It addresses change control and ensures all personnel remain accountable for their part of the process.
Contamination
Incorrect or incomplete data is entered into the database
Data Mining
A method of analyzing that data stored within a data warehouse. Performed using queries.
Data Warehouse
Database management mechanism that allows the storing of data from multiple databases. It requires all data to be of similar type.
Deadlocking
Simultaneous attempts to access a single point of data, causing both users to be denied access.
Detailed COCOMO
Determines development time and cost using the basic method as well as personnel and hardware constraints, tools, etc.
Distributed Componenet Object Model (DCOM)
Same as COM but works with distributed systems.
Distributed Database System
Utilizes data from multiple source databases, which reside in different places.
Function Point Measurement Model
Determines development time using input types from both external and internal sources, file types, and external inquiries.
Hierarchical Database System
Utilizes a tree structure with all data stemming from a root and branching into parent and child relationship
Iterative Software Development Model
A method of designing and creating software that separates a project into smaller more manageable pieces, allowing independent development of each piece.
Name 2 different Iterative Software Development Model Types
- Joint Analysis Development (JAD) ? Involves end users and developers during all phases
- Rapid Application Development(RAD) ? uses unmovable deadlines to drive the project
Name 3 different Iterative Software Development Models
- Object Oriented Programming(OOP) ? canned code i.e. VB, Java.
- Sprial Model ? uses prototypes
- Cleanroom ? used when projects need accreditation and certification.
Name 3 different Waterfall Software Development Models
- Computer Aided Software Engineering(CASE) ? commonly used with large projects.
- Structured Programming Development Model(SPDM) ? often pieces are developed separately.
- Systems Development Life Cycle(SDLC) ? Uses project management to control development.
Name the 3 processed for Change Control
- Request
- Process
- Release
Name the 5 levels of the Software Capabiltiy Maturity Model
- Initiate
- Repeatable
- Defined
- Managed
- Optimized
Object Linking and Embedding (OLE)
Allows computer wide components to function with all software types.
Object Oriented Database System
Utilizes multiple data types, which are located using objects stored in the data keying tothe actual item (i.e. active directory)