Domain 8: (Software Development Security) Flashcards
What can improve application security and reduce risk for some important core functions?
Code Libraries
What evaluates security of an application during runtime?
Dynamic Application Security Testing
What will improve recoverability and issues tracking?
Release Versioning
What describes the analysis of cpu software performed without actually executing programs, where the tester has access to the underlying framework, design, and implementation and requires source code.
Static Application Security Testing
What is a program which communicates w/ a web app and the tester has no knowledge of the technologies or frameworks that the app is built on, and no source code is required.
Dynamic Application Security Testing
In a basic relational database management system, what contains a number of attributes or fields and corresponds to a column.
Tables
In a basic relational database management system, what is a data record within a table?
Rows
In a basic relational database management system, what represents a set of data values of a particular type, one value for each row of the database.
Columns
What is a subset of attributes that can be used to uniquely identify any record in a table?
Candidate Keys
What is selected from the set of candidate keys for a table to be used to uniquely identify the record in a table, each table can only have one, and is selected by the database designer.
Primary Keys
What is used to enforce relationships between two table, also known as referential integrity.
Foreign Keys
What ensures that if one table contains a foreign key, it corresponds to a still-existing primary key in the other table in the relationship.
Referential Integrity
What are two common RDMS attacks?
Aggregation
Inference
What is the ability to create sensitive information by combining non-sensitive from separate sources?
Aggregation Attacks
What is the ability to deduce or assume sensitive information from observing non-sensitive pieces of information?
Inference Attacks
What can prevent an aggregation attack?
Need-to-know and least privilege
What can prevent an inference attack?
Blurring data and database partitioning
What allows a systems to stimulate additional primary memory resources through the use of secondary storage?
Virtual Memory
What consists of more inexpensive, nonvolatile storage resources available to a sys for long-term use?
Secondary storage
What allows the operating sys to request contents from any point within the media?
Random Access Storage
What are examples of random access storage?
RAM and Hard Drives
What requires scanning through the entire media from the beginning to reach a specific address?
Sequential Access Storage
What are example/s of sequential access storage?
Magnetic Tape
What allows a sys to stimulate secondary storage resources through the use of primary storage.
Virtual Storage
What consists of two main components: a knowledge base that contains a series of “if/then” rules and an inference engine that uses that information to draw conclusions about other data.
Expert Systems
What simulate functions of the human mind by arranging a series of layered calculations to solve problems and require extensive training on a particular problem before they can offer solutions.
Neural Networks
What uses several iterations of waterfall model to produce a number of fully specified and tested prototypes?
Spiral Model
What are the four principles of the agile model?
Individuals and Interactions
Working software
Customer collaboration
Responding to change
What are the seven stages of the waterfall model?
System Requirements
Software Requirements
Preliminary Design
Detailed Design
Code and Debug
Testing
Ops & Maintenance
What are the steps and plans of the software capability maturity model (SW-CMM)?
Initial: No Plan
Repeatable: Basic lifecycle mgmt
Defined: Formal, documented SW development processes
Managed: Quantitative measures to gain detailed understanding
Optimized: Continuous development process, w/ feedback loops
What are the steps and process of the IDEAL model?
Initiating: Business reasons outlined
Diagnosing: Engineers analyze current state of org
Establishing: Org takes recommendations & develops plan for changes
Acting: Plan is put into action
Learning: Org continuously analyzes efforts and results and proposes new actions
What provides an organized framework within which users can request modifications?
Request Control
What is used by developers to re-create the situation encountered by the user and analyze the appropriate changes to remedy the situation.
Change Control
What are four main propagation techniques viruses use?
File Infection
Service Injection
Boot Sector Infection
Macro Infection
What infects different types of executable files and trigger when the operating sys attempts to execute them?
File Infection
What can escape detection by injecting themselves into trusted runtime processes of the OS, such as svchost.exe, winlogin.exe, and explorer.exe.
Service Injection
What can infect the legitimate boot sector and are loaded into memory during the OS load process?
Boot Sector Infection
What can infect and spread through code in macros?
Macro Infection
What uses signature-based detection algorithms to look for telltale patterns of known viruses?
Antiviruses Software
What is freely available on the internet and used as a 2nd step by attackers to exploit know vulnerabilities in various OSs enabling attackers to elevate privileges?
Rootkit Attack
What type of web application attack uses unexpected input to a web app to gain unauthorized access to an underlying database?
SQL Injection Attack
What type of web app attack injection that uses malicious scripts into otherwise benign and trusted sites?
Cross-site Scripting (XSS)
What are some network reconnaissance techniques?
IP Probes
Port Scans
Vulnerability Scans
What are automated tools simply used to attempt to ping each address in a range?
IP Probes
What scans a sys for open/listening ports, often web servers, file servers and other servers supporting critical operations?
Port Scans
What ring level is the kernel?
Ring 0
What ring level are device drivers?
Ring 1 and Ring 2
What ring level are applications?
Ring 3
What is the software development lifecycle?
Requirements Analysis
Design
Implementation
Testing
Evolution
What represents several mutually independent security apps, processes, or services that operate toward a single common goal?
Concentric Circle Security
What type of attack is an act of exploiting holes in unpatched or poorly configured software you buy and install?
Shrink Wrap Code Attacks