Defensive design Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Examples of defensive design considerations include protection against unexpected user inputs or actions, such as a user entering a letter where a number was expected, maintainability - ensuring code is readable and understandable and minimising/removing bugs.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

During the defensive design process, methods are put in place to eliminate misuse. If this is not completely possible then it will aim to minimise the negative consequences. This essentially means that the program crashes.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication is used to prove something is valid, genuine or true. It can be used to check if a user is legitimate or if someone is trying to access a computer with malicious intent.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Input validation is the process of testing input received by the application for compliance against a standard defined within the application.

A

It is often used to test whether security methods are safe or if programs work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In computer programming, an indentation style is a convention governing the indentation of blocks of code to convey program structure.

A

It allows a program to have a clear beginning and end so both the user and the computer can adequately understand it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Commenting is used in programming to allow suggestions and improvements to the code without actually modifying the actual code.

A

It appears as a separate format to the programming code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly