Defensive design Flashcards
Examples of defensive design considerations include protection against unexpected user inputs or actions, such as a user entering a letter where a number was expected, maintainability - ensuring code is readable and understandable and minimising/removing bugs.
During the defensive design process, methods are put in place to eliminate misuse. If this is not completely possible then it will aim to minimise the negative consequences. This essentially means that the program crashes.
Authentication is used to prove something is valid, genuine or true. It can be used to check if a user is legitimate or if someone is trying to access a computer with malicious intent.
Input validation is the process of testing input received by the application for compliance against a standard defined within the application.
It is often used to test whether security methods are safe or if programs work.
In computer programming, an indentation style is a convention governing the indentation of blocks of code to convey program structure.
It allows a program to have a clear beginning and end so both the user and the computer can adequately understand it.
Commenting is used in programming to allow suggestions and improvements to the code without actually modifying the actual code.
It appears as a separate format to the programming code.