Domain 8 - Software Development Security Flashcards

1
Q

ActiveX Data Objects (ADO)

A

A Microsoft high-level interface for all kinds of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Capability Maturity Model for Software (CMM or SW-CMM)

A

Maturity model focused on quality management processes and has five maturity levels that contain several key practices within each maturity level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common Object Request Broker Architecture (CORBA)

A

A set of standards that addresses the need for interoperability between hardware and software products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer Virus

A

A program written with functions and intent to copy and disperse itself without the knowledge and cooperation of the owner or user of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Configuration Mangement (CM)

A

Monitoring and managing changes to a program or documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Covert Channel

A

An information flow that is not controlled by a security control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

The conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Mining

A

The practice of examining large databases in order to generate new information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Database Management System (DBMS)

A

A suite of application programs that typically manages large, structured sets of persistent data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Database Model

A

Describes the relationship between the data elements and provides a framework for organizing the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DevOps

A

An approach based on lean and agile principles in which business owners and the development, operations, and quality assurance departments collaborate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Log

A

A record of the events occurring within an organization’s systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrated Product and Process Development (IPPD)

A

A management technique that simultaneously integrates all essential acquisition activities through the use of multidisciplinary teams to optimize the design, manufacturing, and supportability processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Iterative Models

A

Development models that allow for successive refinements of requirements, design, and coding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Knowledge Discovery in Databases (KDD)

A

A mathematical, statistical, and visualization method of identifying valid and useful patterns in data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Metadata

A

Information about the data.

17
Q

Rapid Application Development (RAD)

A

A form of rapid prototyping that requires strict time limits on each phase and relies on tools that enable quick development.

18
Q

Software Assurance (SwA)

A

The level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at any time during its life cycle, and that it functions in the intended manner.

19
Q

Time Multiplexing

A

Allows the operating system to provide well-defined and structured access to processes that need to use resources according to a controlled and tightly managed schedule.

20
Q

Time of Check/Time of Use (TOC/TOU) Attacks

A

Takes advantage of the dependency on the timing of events that takes place in a multitasking operating system.

21
Q

Trusted Computing Bases (TCB)

A

The collection of all of the hardware, software, and firmware within a computer system that contains all elements of the system responsible for supporting the security policy and the isolation of objects.

22
Q

Waterfall Development Model

A

A development model in which each phase contains a list of activities that must be performed and documented before the next phase begins.