Domain 8 Flash Cards
ActiveX Data Objects (ADO)
A Microsoft high-level interface for all kinds of data.
Acceptance
formal, structured hand-off of the completed software system to the customer org; usually involves test, analysis and assessment activites
Accreditation
AKA Security Accreditation a formal declaration by a designated accrediting authority (DAA) that an information system is approved to operate at an acceptable level of risk, absed onthe implementation an approved set of technical, managerial, and procedural safeguards
ACID Test
data integrity provided by means of enforcing atomicity, consistency, isolation, and durability policies
Aggregation
ability to combine non-sensitive data from separate sources to create sensitive info; note that aggregation is a “security issue”, where as inference is an attack (where an attacker can pull together peces of less sensitive info to derive info of greater sensitivity)
Arbitrary code
alternate set of instructions and data that an attacker attempts to trick a processor into executing
Buffer overflow
source code vulnerability allowing access to data locations outside of the storage space allocated to the buffer; can be triggered by attempting to input data larger than the size of the buffer
Bypass attack
attempt to bypass front-end controls of a database to access information
Capability Maturity Model for
Software (CMM or SW CMM)
Maturity model focused on quality management processes and has five maturity levels that contain several key practices within each maturity level.
Common Object Request
Broker Architecture (CORBA)
A set of standards that addresses the need for interoperability between hardware and software products. residing on different machines across a network; providing object location and use across a network
Computer virus
A program written with functions and intent to copy and disperse itself without the knowledge and cooperation of the owner or user of the computer
Configuration management
(CM)
A formal, methodical, comprehensive process for establishing a baseline of the IT environment (and each of the assets within that environment).
collection of activities focused on establishing and maintaining integrity of IT products and information systems, through the control of processes for initialization, changing and monitoring the configurations of those products and systems throughout the system development lifecycle
Covert channel
An information flow that is not controlled by a security control and has the opportunity of disclosing confidential information.
a method used to pass information over a path that is not normally used for communiction; communication pathways that violate security policy or requirement (deliberately or unwittingly); basic types are timing and storage
Certification
comprehensive technical security analysis of a system to ensure it meets all applicable security requirements
Change Advisory Board (CAB)
purpose is to review and approve/reject proposed code changes
Citizen programmers
organizational members who codify work-related knowledge, insights, and ideas into (varying degress of) usable software; the process and result is ad hoc, difficult to manage, and usually bereft of security considerations
Code protection/logic hiding
prevents one software unit from reading/altering the source/intermediate/executable code of another software unit
Code resuse
reuse of code, rather than re-invented code means units of software (procedures/objects) means higher productivity toward development requirements using correct, complete, safe code
Complete coverage
testing all of the functions of software
Configuration Control
process of controlling modifications to hardware, firmware, software, and documentation to protect the information system against improper modifications prior to, during, and after system implementation
Data mining
A decision-making technique that is based on a series of analytical techniques taken from the fields of mathematics, statistics, cybernetics, and genetics.
analysis and decision-making technique that relies on extracting deeper meanings from many different instances and types of data; often applied to data warehouse content
Data base Management
System (DBMS)
A suite of application programs that typically manages large, structured sets of persistent data
Database model
Describes the relationship between the data elements and provides a framework for organizing the data. design process that identifies all data elements that the system will need to input, create, store, modify, output, and destroy during operational use; should be one of the first steps in analysis and design
DevOps
An approach based on lean and agile principles in which business owners and the development, operations, and quality assurance departments collaborate.