Chapter 7: Software Development Security Flashcards
Describe local/nondistributed computing.
All user-executed code is stored on the single machine.
What is a logic bomb?
A malicious code object that lies dormant until events occur that satisfy one or more logical conditions, at which time they deliver their payload.
What is a worm?
A malicious code object that spreads from ssytem to system bearing some type of malicious payload. Unlike viruses, they are self-replicating, requiring no user interaction to propagate.
What is distributed computing?
Allowing a user to harness the computing power of one or more remote systems to achieve a single goal.
What is an agent or bot?
Intelligent code objects that perform actions on behalf of a user.
What is an applet?
A code object sent from a server to a client to perform some action. A miniature program that executes independently of the server that sent it.
What are the benefits of applets?
Processing is shifted to the client, freeing up resources on the server
The client can produce datat using local resources rather than waiting for th eremote server, often speeding response.
All data can stay on the client, improving security from the client’s perspective.
What are the distinctions between Java and ActiveX applets?
ActiveX is Microsoft only.
ActiveX is not subject to sandbox restrictions, and has full access to the client system.
What is a database view?
SQL statements that present data to the user as if it were a table.
What is concurrency or edit control in the database context?
A preventative security mechanism that endeavors to make sure that the information in the database is always ocrrect or has its integrity and availability protected. Locking, so only one user at a time can make changes.
What is polyinstantiation?
When two or more rows in the same relational database table appear to have identical primary key elements but contain different data for use at differing classification levels. Often used as a defense against some times of inference attacks.
What is a data warehouse?
Large databases used to store large amounts of information from a variety of databases for use with specialized analysis techniques. Often contain detailed historical information not normally stored in production databases because of storage limitations or security concerns.
What is a data dictionary?
Used for storing critical information about data including usage, type, sources, relationshipts, and formats. Determines access rights for users attempting to access data.
What is data mining?
Techniques for combing through data warehouses to look for potential correlated information.
What is a data mart?
p. 292. Not well defined.
What is primary or real memory?
RAM
What is secondary storage?
magnetic and optical media, tapes, disks, hard drives, falsh drives, CD/DVD.
What is virtual memory?
Simulating primary storage through use of secondary storage.
What is virtual storage?
Simulating secondary storage through the use of primary storage. For example, a RAM disk.
What is random access storage?
Storage that allows the operating system to request contents from any point within the media. RAM, for example, but not tape.
What is sequential access storage?
Storage that requires scanning through the entire media from the beginning to reach an address. Commonly, tapes.
What is volatile storage?
Storage that loses its contents when power is removed.
What is nonvolatile storage?
Storage that does not depend on the presence of power to maintain its contents.
What is an expert system?
A system that seeks to embody the accumulated knowledge of experts and apply it in a consistent fashion to future decisions.
What is a risk of expert systems?
They’re not infalliable. They’re only as good as the data in the knowledge base and the decision making algorithms implemented in the inference engine.
What is a neural network?
Chains of computational units used in an attempt to imitate the biological reasoning process of the human mind.
How do neural networks work?
They use many layers of summation, each of which requires weighting information to reflect the relative importance of the calculation in the overall decision making process.
What is a decision support system?
A knowledge-based application that analyzes business data and presents it in such a way as to make business decisions easier for users.
Define fail-secure.
A fail-secure state puts the system in a high level of security and may even disable it entirely until an administrator can diagnose the problem and restore the system to normal operation.
Define fail-open
Allows users to bypass failed security controls, erring on the side of permissiveness.