Chapter 3.6 Flashcards
cilent side validation
Client side input validation verifies data is valid upon entry to the system. Proper input validation uses a set of rules to validate entries in fields for proper use. In the event an entry is invalid, the application will reject the entry.
server side validation
Server side validations occur on the web server or back-end and take more time to complete. Validation on the server side is more secure than client side validation.
code obfuscation
Code obfuscation is a measure in which the developer camouflages code to make it unreadable. This a secure coding practice.
waterfall
The Waterfall method maintains a top to bottom approach. When one stakeholder has finished a piece of work, the other can then begin. The waterfall approach ensures each phase of development is completed before another can proceed.
agile
Agile development encourages continued interaction between each stakeholder to produce continued deliverables at a quick pace.
kanban
The kanban methodology of software development is an agile approach that focuses on the growth of products with continual delivery while not overburdening the development team.
Secure DevOps
The Secure DevOps development model combines the words development and operations. It is an agile-aligned model that includes security throughout its process.
provisioning
Provisioning is the process of procuring, configuring and making available an application or system on certain services. Provisioning an application allows it to run on its intended platform. Since the new version has already been released in this scenario, this step has already taken place.
deprovisioning
Deprovisioning is the act of removing or disabling access to a resource.
normalization
Normalization is used to optimize database performance by removing duplicates, use of primary keys, and related data contained in separate tables.
model verification
Model verification is the process of ensuring that software meets its intended purpose and specifications.
version control
Version control tracks the versions of software in real time. It will record who has accessed the code as well as what was changed. Version Control also allows for rollback if necessary.
change management
Change management is a process that follows a change to a system from identification to implementation. It is used for controlled identification and implementation of required changes within a computer system.
stored procedures
A stored procedure is a set of Structured Query Language (SQL) statements stored in a database as a group, so it can be reused and shared by multiple programs. Stored procedures can validate input.
state table
A state table contains information about sessions between network hosts. This type of data is gathered by a stateful firewall.