Software Dev Sec Flashcards
ORB
Object request broker: used to locate object; object search engines; middleware; include COM, DCOM, CORBA
Defined
s/w process for both mgt and engineering activites id socumented, standardized and integrated into standard s/w process for org
genetic programming
seeks to replicate nature’s evolution; creates random programs and assigns them a task of solving a problem
4 s/w freedoms
freedom to 1. use the s/w for any purpose 2. change the s/w to suit your needs 3. share the s/w w/ friends and neighbors 4. share the changes you make
compilers
take source code, such as C or basic and compile it into machine code
PHP RFI
PHP Remote file inclusion: altering normal PHP URLs and variables to include and execute remote content
optimized
continual process improvement is enabled by quantitative feedback from the process and from piloting innovative ideas and technologies
repeatable
basic proj mgt process are establishe to track cost, schedule, and funtionality; necessary process discipline is in place to repeat earlier successes on similar projects
ANN
artificial neural networks: expert system that simulates neural networks found in humans and animals; seek to duplicate biological neural networks; leanrs by example via training
types of CASE software
- tools: support onlyl specific tasks in s/w production process 2. workbenches: support 1 or a few s/w process activities by integrating several tools in a single application 3. environments: support all or at least part of the s/w production process w/collection of tools and workbenches
bayesian filtering
commonly used to ID spam
Agile Manifesto values
- individuals and interactions over process and tools 2 working s/w over comprehensive doc 3. customer collaboration over contract negotiation 4. responding to change over following a plan
scrum
named for way Rugby is played. No baton race in track, instead whole team works to move the project by passing ball back and forth as needed
datawarehouse
large collection of data
COM
component object model: ORB that locates objects on a local system
SQL injection
manipulation of a back end SQL server via a front end web server
s/w testing levels
unit, installation, integration, regression, acceptance
white box s/w testing
gives the tester access to program source code, data structures, variables, etc
XSS
cross site scripting: leverages third-party execution of web scripting languages such as javascript within the security context of a trusted site
source code
computer programming language instructions that are written in text that must be translated into machine code before execution by the CPU
open source
software publishes source code publicly
expert systems
- knowledge base of if/then statements 2. inference engine that follows the tree formed by knowledge base and fires a rule when there is a match
traceability matrix
used to map customer’s req’ts to s/w testing plan
primary key
unique value in each tuple in a table
black box testing
gives test no internal details
dynamic testing
tests the code while executing it
installation testing
testing s/w as it is installed and first operated
4GL
fourth generation language: computer languages designed to increase programmer’s efficiency by automating creation of computer code; GUI focused; focus on creation of databases, reports, websites
closed source
software is typically released in executable form
average # mistakes in computer code
10-50 mistakes per 1000 lines of code
database replication
mirrors a live database, allowing simultaneous reads and writes to multiple replicated databases by clients
relational database
contains 2-dimensional tables of related data
privilege escalation
allow an attacker with (typically limited) access to be able to access additional resources
shareware
fully functional proprietary s/w that may be initially used free, but requires you to pay if you continue to use it
normalization
seeks to make the data in a database table logically concise, organized, and consistent.
interpreted languages
compiled on the fly each time the program is run
integration testing
testing multiple s/w components as they are combined into a working system; subsets may be tested, or big bang integration testing tests all integrated s/w components
entity integrity
each tuple has a unique primary key that is not null
crippleware
partially functioning proprietary s/w, often with key features disabled; must pay to get the full bologna
assembly language
low-level computer programming laguage; uses short mnemonics that match to machine language instructions
referential integrity
every foreign key in a secondary table matches a primary key in the parent table
RAD
rapid application development: develops s/w via use of prototypes, dummy GUIs, back-end databases; goal is quickly meeting business needs of the suystem, technical concerns are secondary
Object
a “black box” that combines code and data and sends and receives messages
genetic algorithms
refer to creating shorter pieces of code called chromosomes
foreign key
key in a related database table that matches a primary key in a parent database; foreign key is the local table’s primary key
database view
results of a database query
DCOM
distributed common object model: ORB that locates objects over a network
CASE
computer aided software engineering: uses programs to assist in the creation and mx of other computer programs
TD
top down programming: startes with broadest and highest level requirements and works down toward the low-=level technical implementation details
responsible disclosure
practice of privately sharing vulnerability info with a vendor and w/holding public release until a patch is available
combinatorial s/w testing
black-box testing method that seeks to ID and test all unique combinations of s/w inputs
managed
detaield measures of the s/w process nd product quality are collected, analyzed, and used to control the processs; s/w process and products are quantitively understood and controlled
machine code
software that is executed directly by the CPU; series of 1’s and 0’s that translate to instructions understood by CPU
data integrity
databases must ensure the intregrity of the data in the tables
data dictionary
description of the database tables; aka meta data
database schema
describes the attributes and values of the database tables
backdoors
shortcuts in a system that allow a user to bypass seucirty checks
DML
data manipulation language: used to query and update data stored in the tables
coupling
highly coupled object requires lots of other objects to perform basic jobs, like math; inversely related to cohesion
waterfall model
an application development model that uses rigid phases; when one phase ends, the next begins; cannot go back to previous steps;
steps of SDLC
prepare sucirty plan, initiation, development/acq, implementation, ops/mx, disposal
spiral model
software development model designed to dcontrol risk
sashimi model
highly overlapping steps; real-world successor to watefall model; named for overlapping fish dish called sashimi
shadow database
like a replicated database except shadows mirror all changes to primary database, clients can’t access the shadow
static testing
tests code passively; code isn’t running; includes walkthroughs, syntax checking, code reviews
XP core practices
1 palnning: specifies desired features (user story) 2. paired programming: programmers work in teams 3. 40-hr week: accurate forecast of work 4. total customer involvement: customer always available and monitors proj 5. detailed test procedures aka unit tests
CORBA
common object request borker architecture: ORB; open vendor-neutral networked object broker framework; enforces fundamental OO design as low-level deatails are encapsulated from client
regression testing
testing s/w after updates, modifications, or patches
BU
bottom up programming: starts w/ low-level technical implementation details and works up to the concept of the complete program
SDLC
system or software development lifecycle model: development model that focuses on security in every phase
programming languge generations
1st: machine code 2nd: Assemby 3rd: COBOL, C Basic 4th: ColdFusion, Progress 4GL, Oracle Reports
agile software development
evolved as reaction to rigid s/w dev models such as waterfall model; includes Scrum and XP
DDL
data defined language: used to create, modify, and delete tables
fuzzing
type of black box testing that enters random, malformed data as inputs into software programs to determine if they will crash
CMM
software capability maturity model: 5 levels: initial, repeatable, defined, managed, optimizing
XP improvements
- communication 2. simplicity 3. feedback 4. respect 5. courage
unit testing
low-level tests of s/w components, such as functions, procedures, or objects
prototyping
iterative apprach that breaks projects into smaller tasks creating multiple mockups of system design features
procedural languages
programming languages that use subroutines, procedures, and functions
database
structured collection of related data
tuple
a row in a relational database
cohesion
very independent object; inversely related to coupling
buffer overflow
occurs when a programmer does not perform variable bounds checking
OOP
Object Oriented Programming: changes the older procedural progrmaming methodology and treats programs as a series of connected objects that comm via messages, uses encapsulation
XP
Extreme Programming: an agile development method that uses pairs of programmers who work off a detailed specification
initial
characterized as ad hoc and occasionally even chaotic; few process defined and success depends on individual effort
full disclosure
controversial practice of releasing vulnerability details publicly
data mining
search for patterns in data
acceptance testing
testing to sendure s/w meets the customer’s operational req’ts; when done by customer is called user acceptance testing
freeware
aka “gratis” software; free as in beer; free of charge to use
directory path traversal
escaping from the root of a web server into the regular file system by referencing directories
polyinstantiation
two instances with the same name can contain different data; useful in multilevel security environments
hard-coded credentials
backdoor username/passwords left by programmers in production code
waterfall steps (general)
req’ts, analysis, design, code, test, ops, and then destruction which he left off
semantic integrity
each attribute value is consistent with the attribute data type
attribute
a column in a relational database
hierarchical databases
form a tree
sprial model
designed to conttrol risk; repeats steps of a proejcts in ever-wider spirals called rounds