Applications Security Flashcards
Aggregation Database Threat
Access of part of classified information by unauthorized users.
Basic Constructive Cost Model(COCOMO)
Determines the total number of months a project will take to complete.
Bypass Attacks
Going around security mechanisms to access unauthorized information.
Common Object Request Broker Architecture(CORBA)
Allows all components to process requests and responses from each other.
Component Object Model(COM)
Addresses software components and their functions. Functions are not dependent on rules of language
Concurrency Database Threat
Simultaneous activity on a single point of data
Configuration Management
Is a mechanism that monitors the entire Software Life Cycle. It addresses change control and ensures all personnel remain accountable for their part of the process.
Contamination
Incorrect or incomplete data is entered into the database
Data Mining
A method of analyzing that data stored within a data warehouse. Performed using queries.
Data Warehouse
Database management mechanism that allows the storing of data from multiple databases. It requires all data to be of similar type.
Deadlocking
Simultaneous attempts to access a single point of data, causing both users to be denied access.
Detailed COCOMO
Determines development time and cost using the basic method as well as personnel and hardware constraints, tools, etc.
Distributed Componenet Object Model (DCOM)
Same as COM but works with distributed systems.
Distributed Database System
Utilizes data from multiple source databases, which reside in different places.
Function Point Measurement Model
Determines development time using input types from both external and internal sources, file types, and external inquiries.