Applications Security Flashcards

1
Q

Aggregation Database Threat

A

Access of part of classified information by unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Basic Constructive Cost Model(COCOMO)

A

Determines the total number of months a project will take to complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bypass Attacks

A

Going around security mechanisms to access unauthorized information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common Object Request Broker Architecture(CORBA)

A

Allows all components to process requests and responses from each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Component Object Model(COM)

A

Addresses software components and their functions. Functions are not dependent on rules of language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Concurrency Database Threat

A

Simultaneous activity on a single point of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Configuration Management

A

Is a mechanism that monitors the entire Software Life Cycle. It addresses change control and ensures all personnel remain accountable for their part of the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Contamination

A

Incorrect or incomplete data is entered into the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Mining

A

A method of analyzing that data stored within a data warehouse. Performed using queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Warehouse

A

Database management mechanism that allows the storing of data from multiple databases. It requires all data to be of similar type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Deadlocking

A

Simultaneous attempts to access a single point of data, causing both users to be denied access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Detailed COCOMO

A

Determines development time and cost using the basic method as well as personnel and hardware constraints, tools, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Distributed Componenet Object Model (DCOM)

A

Same as COM but works with distributed systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Distributed Database System

A

Utilizes data from multiple source databases, which reside in different places.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Function Point Measurement Model

A

Determines development time using input types from both external and internal sources, file types, and external inquiries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hierarchical Database System

A

Utilizes a tree structure with all data stemming from a root and branching into parent and child relationship

17
Q

Iterative Software Development Model

A

A method of designing and creating software that separates a project into smaller more manageable pieces, allowing independent development of each piece.

18
Q

Name 2 different Iterative Software Development Model Types

A
  1. Joint Analysis Development (JAD) ? Involves end users and developers during all phases
  2. Rapid Application Development(RAD) ? uses unmovable deadlines to drive the project
19
Q

Name 3 different Iterative Software Development Models

A
  1. Object Oriented Programming(OOP) ? canned code i.e. VB, Java.
  2. Sprial Model ? uses prototypes
  3. Cleanroom ? used when projects need accreditation and certification.
20
Q

Name 3 different Waterfall Software Development Models

A
  1. Computer Aided Software Engineering(CASE) ? commonly used with large projects.
  2. Structured Programming Development Model(SPDM) ? often pieces are developed separately.
  3. Systems Development Life Cycle(SDLC) ? Uses project management to control development.
21
Q

Name the 3 processed for Change Control

A
  1. Request
  2. Process
  3. Release
22
Q

Name the 5 levels of the Software Capabiltiy Maturity Model

A
  1. Initiate
  2. Repeatable
  3. Defined
  4. Managed
  5. Optimized
23
Q

Object Linking and Embedding (OLE)

A

Allows computer wide components to function with all software types.

24
Q

Object Oriented Database System

A

Utilizes multiple data types, which are located using objects stored in the data keying tothe actual item (i.e. active directory)

25
Q

Object Request Broker (ORB)

A

Addreses System components.

26
Q

Online Transaction Processing (OLTP)

A

Using unauthorized query tools to access the database.

27
Q

Open Database Connectivity (ODBC)

A

Allows for database access using SQL

28
Q

Polyinstantiation Database Threat

A

Storing of identical data in multiple locations.

29
Q

Relational Database System

A

Utilizes a column and row data orientation with headers and primary keys to locate attributes (i.e. Access)

30
Q

Security Controls

A

The mechanisms used to handle software threats. No single control will address all possible threats. (i.e. secure state, AV, Backup, Password, Security kernal)

31
Q

Software Capability Maturity Model

A

A five level model that evaluates an organization’s software development process. Higher levels of maturity indicate the project’s dedication to improvement. Lower levels of maturity indicate a lack of procedure.

32
Q

Software Life Cycle Model(SLIM)

A

Determines the total number of months a project will take to complete and its cost using the number of software instructions for a simple project to estimate the end result.

33
Q

Waterfall Software Development Model

A

Requires edit completion before moving to the next phase. No changes are allowed to a past phase.

34
Q

What are the 2 types of Artificial Intelligence(AI)

A
  1. Expert Systems ? software program designed to answer complex questions in the form of a human export. Can incorporate fuzzy logic.
  2. Neural Networks ? Functions similar to the human brain.It learns over time. Also can use fuzzy logic.
35
Q

What are the 3 types of Database Integrity?

A
  1. Entity integrity ? ensures data rows have a unique identity.
  2. Referential integrity ? ensures an identifier from one table references an existing correct identifier in another.
  3. Semantic integrity ? ensures that database rules are enforced.
36
Q

What are the 6 stages to the Software Life Cycle

A
  1. Initiation ? Key phase, prjct proposal and risk analysis.
  2. Analysis ? security requirements and Baselines outlined.
  3. System Specification ? explores how the software will interact with networks, internet, etc.
  4. Design and Development ? Actual code is created.
  5. Implementation ? software project released & installed. accreditation and certification are initiated and completed.
  6. Maintenance ? any software changes or updates. Continuous audit.