Applications Security Flashcards

1
Q

Aggregation Database Threat

A

Access of part of classified information by unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Basic Constructive Cost Model(COCOMO)

A

Determines the total number of months a project will take to complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bypass Attacks

A

Going around security mechanisms to access unauthorized information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common Object Request Broker Architecture(CORBA)

A

Allows all components to process requests and responses from each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Component Object Model(COM)

A

Addresses software components and their functions. Functions are not dependent on rules of language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Concurrency Database Threat

A

Simultaneous activity on a single point of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Configuration Management

A

Is a mechanism that monitors the entire Software Life Cycle. It addresses change control and ensures all personnel remain accountable for their part of the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Contamination

A

Incorrect or incomplete data is entered into the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Mining

A

A method of analyzing that data stored within a data warehouse. Performed using queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Warehouse

A

Database management mechanism that allows the storing of data from multiple databases. It requires all data to be of similar type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Deadlocking

A

Simultaneous attempts to access a single point of data, causing both users to be denied access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Detailed COCOMO

A

Determines development time and cost using the basic method as well as personnel and hardware constraints, tools, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Distributed Componenet Object Model (DCOM)

A

Same as COM but works with distributed systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Distributed Database System

A

Utilizes data from multiple source databases, which reside in different places.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Function Point Measurement Model

A

Determines development time using input types from both external and internal sources, file types, and external inquiries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hierarchical Database System

A

Utilizes a tree structure with all data stemming from a root and branching into parent and child relationship

17
Q

Iterative Software Development Model

A

A method of designing and creating software that separates a project into smaller more manageable pieces, allowing independent development of each piece.

18
Q

Name 2 different Iterative Software Development Model Types

A
  1. Joint Analysis Development (JAD) ? Involves end users and developers during all phases
  2. Rapid Application Development(RAD) ? uses unmovable deadlines to drive the project
19
Q

Name 3 different Iterative Software Development Models

A
  1. Object Oriented Programming(OOP) ? canned code i.e. VB, Java.
  2. Sprial Model ? uses prototypes
  3. Cleanroom ? used when projects need accreditation and certification.
20
Q

Name 3 different Waterfall Software Development Models

A
  1. Computer Aided Software Engineering(CASE) ? commonly used with large projects.
  2. Structured Programming Development Model(SPDM) ? often pieces are developed separately.
  3. Systems Development Life Cycle(SDLC) ? Uses project management to control development.
21
Q

Name the 3 processed for Change Control

A
  1. Request
  2. Process
  3. Release
22
Q

Name the 5 levels of the Software Capabiltiy Maturity Model

A
  1. Initiate
  2. Repeatable
  3. Defined
  4. Managed
  5. Optimized
23
Q

Object Linking and Embedding (OLE)

A

Allows computer wide components to function with all software types.

24
Q

Object Oriented Database System

A

Utilizes multiple data types, which are located using objects stored in the data keying tothe actual item (i.e. active directory)

25
Object Request Broker (ORB)
Addreses System components.
26
Online Transaction Processing (OLTP)
Using unauthorized query tools to access the database.
27
Open Database Connectivity (ODBC)
Allows for database access using SQL
28
Polyinstantiation Database Threat
Storing of identical data in multiple locations.
29
Relational Database System
Utilizes a column and row data orientation with headers and primary keys to locate attributes (i.e. Access)
30
Security Controls
The mechanisms used to handle software threats. No single control will address all possible threats. (i.e. secure state, AV, Backup, Password, Security kernal)
31
Software Capability Maturity Model
A five level model that evaluates an organization's software development process. Higher levels of maturity indicate the project's dedication to improvement. Lower levels of maturity indicate a lack of procedure.
32
Software Life Cycle Model(SLIM)
Determines the total number of months a project will take to complete and its cost using the number of software instructions for a simple project to estimate the end result.
33
Waterfall Software Development Model
Requires edit completion before moving to the next phase. No changes are allowed to a past phase.
34
What are the 2 types of Artificial Intelligence(AI)
1. Expert Systems ? software program designed to answer complex questions in the form of a human export. Can incorporate fuzzy logic. 2. Neural Networks ? Functions similar to the human brain.It learns over time. Also can use fuzzy logic.
35
What are the 3 types of Database Integrity?
1. Entity integrity ? ensures data rows have a unique identity. 2. Referential integrity ? ensures an identifier from one table references an existing correct identifier in another. 3. Semantic integrity ? ensures that database rules are enforced.
36
What are the 6 stages to the Software Life Cycle
1. Initiation ? Key phase, prjct proposal and risk analysis. 2. Analysis ? security requirements and Baselines outlined. 3. System Specification ? explores how the software will interact with networks, internet, etc. 4. Design and Development ? Actual code is created. 5. Implementation ? software project released & installed. accreditation and certification are initiated and completed. 6. Maintenance ? any software changes or updates. Continuous audit.