Section 2.3 Secure Application development, deployment, and automation concepts Flashcards
What do you call the ability to add, remove, or reconfigure hardware and software resources to handle an increase in usage. Requires manual intervention
Scalability
What do you call automatically scaling resources up or down to meet user demands. Completely automatic
Elasticity
What SDLC method goes through each step one by one until they are completed?
Waterfall method
Developers use ____________ to make sure an application does not contain security issues and is resistant to application errors and crashes.
Secure Coding Concepts
What do you call a nonprofit foundation that works to improve the security of software?
OWASP
What does OWASP stand for?
Open Web Application Security Project
Who produces a top 10 vulnerabilities list that has the most common vulnerabilities, how they are exploited, and how to prevent them?
OWASP
What brings together management, development, and operations groups to swiftly release software into production
DevOps
What do you call infrastructure that can not be changed once it is placed?
Immutable Infrastructure
What tools check the various courses of action within the code, validate inputs, and plays a role in integration, delivery, deployment, and monitoring while providing reporting and analytics?
Automation/Scripting Tools
What do you call the surrounding infrastructure that supports software applications?
Data Center
What manages and provisions data centers through machine readable files to support software and user requirements?
Infrastructure as Code
What control keeps multiple developers from overwriting changes that were written by other developers?
Version Control
What ensures everyone associated with a software change understands what changes will be made, when they will be made, and any 2nd or 3rd order effects?
Change Management
What refers to the process of coding applications to accept only certain valid input for user-entered fields?
Input Validation
What concept recognizes specific types of command characters and parses them as simple data rather than executing the text as a command?
Escaping
What is the practice of using either predetermined processes or synthetic processes to create diversity within the software development process?
Software diversity
What analysis is conducted by executing software on a real or virtual processer, with inputs to allow the tester to determine how the software will behave in a potentially negative environment?
Dynamic code analysis
What dynamic technique enters random data into application fields to see how the software program reacts to test for input validation and exception handling?
Fuzzing
What analysis is performed without executing the code, but uses either an automated tool or manual reviewing?
Static code analysis
What checks the ability for a piece of software to undergo large amounts of stress or extremely heavy operating loads by pushing the software beyond its normal or best-scenario operating environments?
Stress testing
What testing provides key performance indicators of software integrity to help measure how effectively software is developed and how efficiently it is tested prior to deployment?
Integrity Measurement
What is largely determined by the OS and programming language environment in use because they can offer varying levels of tools?
Error and Exception Handling
What uses up memory resources needed to execute actions associated with applications?
Resource Exhaustion
What occurs when you have access permissions or systems of trust between different components of a software application that allow users to pass through unexpectedly and without proper authorization to access another software component?
Transitive Access
Which type of validation responds to users quicker but the client must have compatible software with the server?
Client-side validation