Domain 8. Software Development security Flashcards

1
Q

Aggregation

A

When a user does not have the clearance or permission to access specific information, but she does have the permission to access components of this information. She can then figure out the rest and obtain restricted information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Inference

A

Ability to derive information that is not explicitly available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Polyinstatiation

A

Multiple instances of information depending of the clearence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Primary key

A

Unique identifier for each record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Normalization

A

Process of removing duplicates and ensuring that each attribute only describes the primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Entity integrity

A

PK field cant be null

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cardinality

A

Number of rows in the relations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Degree

A

Number of columns in the relations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attribute

A

column

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tuple

A

Collection of attributes (raw)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ACID

A

Atomicity
Consistency
Isolation
Durability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DB Checkpoint

A

Known good point from which the DB can recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DB Savepoint

A

Temporary backup that can be configured based on variables (time interval, number of transactions, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DB Cell suppression

A

Technique used to hide specific cells

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DB view

A

used to permit, allow or restrict users from viewing specific fields or records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

External consistency

A

External consistency ensures that the data stored in the database is consistent with the real world.

17
Q

Decision Support System (DSS)

A

The Decision Support System (DSS) is what some of the books are referring to as the Delphi Method or Delphi Technique

18
Q

Acceptance

A

confirms that users’ needs have been met by the supplied solution

19
Q

Accreditation

A

is the formal acceptance of security, adequacy, authorization for operation and acceptance of existing risk. Accreditation is the formal declaration by a Designated Approving Authority (DAA) that an IS is approved to operate in a particular security mode using a prescribed set of safeguards to an acceptable level of risk.

20
Q

Certification

A

is the formal testing of security safeguards and assurance is the degree of confidence that the implemented security measures work as intended. The certification is a Comprehensive evaluation of the technical and nontechnical security features of an IS and other safeguards, made in support of the accreditation process, to establish the extent to which a particular design and implementation meets a set of specified security requirements.

21
Q

Assurance

A

Assurance is the descriptions of the measures taken during development and evaluation of the product to assure compliance with the claimed security functionality. For example, an evaluation may require that all source code is kept in a change management system, or that full functional testing is performed. The Common Criteria provides a catalogue of these, and the requirements may vary from one evaluation to the next. The requirements for particular targets or types of products are documented in the Security Targets (ST) and Protection Profiles (PP), respectively.

22
Q

Stealth viruses

A

accept incoming scan attempts by the antivirus engine and forwards them to the original file which of course, is normal and uninfected. (And therefore not a threat.)

23
Q

Shell Virus

A

Shell viruses create a “shell” around the compromised file and intercept calls to that program. It may pass the commands along to the compromised program and let the output from that program proceed but it can overwrite or alter the output.

24
Q

Unit Testing

A

Unit testing is the testing of an individual program or module. Unit testing uses set of test cases that focus on control structure of procedural design. These tests ensures internal operation of the programs according to the specification.

25
Q

Bind Value

A

A bind value is a value that can be bound to a placeholder declared within an SQL statement. Usage of Bind Values or Variable can improve the security within your database

26
Q

ISC2 SDLC

A

Project Initiation and Planning
Functional Requirements Definition
System Design Specification
Development and Implementation
Documentations and Common Program Controls
Testing and Evaluation Control, certification and accreditation (C&A)
Transition to production (Implementation)

And there are two phases that will extend beyond the SDLC, they are:
Operation and Maintenance Support (O&M)
Revisions and System Replacement (Disposal)

27
Q

Atomicity

A

Atomicity - Atomicity requires that each transaction is “all or nothing”: if one part of the transaction fails, the entire transaction fails, and the database state is left unchanged. An atomic system must guarantee atomicity in each and every situation, including power failures, errors, and crashes. To the outside world, a committed transaction appears (by its effects on the database) to be indivisible (“atomic”), and an aborted transaction does not happen

28
Q

Consistency

A

Consistency - The consistency property ensures that any transaction will bring the database from one valid state to another. Any data written to the database must be valid according to all defined rules, including but not limited to constraints, cascades, triggers, and any combination thereof. This does not guarantee correctness of the transaction in all ways the application programmer might have wanted (that is the responsibility of application-level code) but merely that any programming errors do not violate any defined rules.

29
Q

Isolation

A

Isolation - The isolation property ensures that the concurrent execution of transactions results in a system state that would be obtained if transactions were executed serially, i.e. one after the other. Providing isolation is the main goal of concurrency control. Depending on concurrency control method, the effects of an incomplete transaction might not even be visible to another transaction.[citation needed]

30
Q

Durability

A
  • Durability means that once a transaction has been committed, it will remain so, even in the event of power loss, crashes, or errors. In a relational database, for instance, once a group of SQL statements execute, the results need to be stored permanently (even if the database crashes immediately thereafter). To defend against power loss, transactions (or their effects) must be recorded in a non-volatile memory.