Domain 8: (Software Development Security) Flashcards
What can improve application security and reduce risk for some important core functions?
Code Libraries
What evaluates security of an application during runtime?
Dynamic Application Security Testing
What will improve recoverability and issues tracking?
Release Versioning
What describes the analysis of cpu software performed without actually executing programs, where the tester has access to the underlying framework, design, and implementation and requires source code.
Static Application Security Testing
What is a program which communicates w/ a web app and the tester has no knowledge of the technologies or frameworks that the app is built on, and no source code is required.
Dynamic Application Security Testing
In a basic relational database management system, what contains a number of attributes or fields and corresponds to a column.
Tables
In a basic relational database management system, what is a data record within a table?
Rows
In a basic relational database management system, what represents a set of data values of a particular type, one value for each row of the database.
Columns
What is a subset of attributes that can be used to uniquely identify any record in a table?
Candidate Keys
What is selected from the set of candidate keys for a table to be used to uniquely identify the record in a table, each table can only have one, and is selected by the database designer.
Primary Keys
What is used to enforce relationships between two table, also known as referential integrity.
Foreign Keys
What ensures that if one table contains a foreign key, it corresponds to a still-existing primary key in the other table in the relationship.
Referential Integrity
What are two common RDMS attacks?
Aggregation
Inference
What is the ability to create sensitive information by combining non-sensitive from separate sources?
Aggregation Attacks
What is the ability to deduce or assume sensitive information from observing non-sensitive pieces of information?
Inference Attacks
What can prevent an aggregation attack?
Need-to-know and least privilege
What can prevent an inference attack?
Blurring data and database partitioning
What allows a systems to stimulate additional primary memory resources through the use of secondary storage?
Virtual Memory
What consists of more inexpensive, nonvolatile storage resources available to a sys for long-term use?
Secondary storage
What allows the operating sys to request contents from any point within the media?
Random Access Storage