Domain 8: Software Development Security Flashcards
Message
communication to or input of an object
Method
internal code that defines the actions an object performs in response to a message
Behavior
results or output exhibited by an object
Class
collection of the common methods from a set of objects that defines the behavior of those objects
Instance
example
Inheritance
methods from a class are inherited from a subclass
Delegation
forwarding of a request by an object to another object
Polymorphism
the characteristic of an object that allows it to respond with different behaviors to the same message or method because of changes in external conditions
Cohesion
strength of the relationship between the purposes of the methods within the same class
Coupling
level of interaction between objects
Assurance procedures
formalized processes by which trust is built into the life cycle of a system
Input Validation
verifies that the values provided by the user match the programmers expectation
Should Input Validation occur on the Server or Client side?
Server
Conceptual Defenition
create the basic concept statement for a system
Functional Requirements Determination
specific system functionalities are listed
Control Specification Development
analyze the system from a security perspective
Code Review Walk Through
look for logical or security flaws
Waterfall Model
step by step life cycle model, can only go back one phase
Spiral Model
multiple iterations of a waterfall style process
Agile Software Development
iterative software development process
Highest Priority in the Agile Manifesto
Satisfy the customer through early and continuous delivery of valuable software
SW-CMM
SW Capability Maturity Model - all orgs move through a variety of maturity phases in sequential fashion
IDEAL Model
Initiating, Diagnosing, Establishing, Acting, Learning