Software Development Security Flashcards
What is a virus?
Piece of code that attaches itself to another piece of code.
What are the majority of todays viruses doing?
Building/ running botnets.
What is a Logic Bomb?
Like a Zero Day. Code that lies dormant until defined activation event.
What is an agent?
Human run piece of autonomous/ distributed code.
What is an Applet?
Code sent from a server to run on a client.
What technology can create Active X controls?
Java, C++, VB, C
What is a key security difference between Java and Active X?
Java has a Sandbox function to limit memory access and ActiveX does not.
What is Cardinality in a relational database?
Number of rows in a table.
What is the Degree in a relational database?
Number of columns in a table.
What is the “domain” in a relational database table?
The allowable values of a database field.
What is a candidate key?
Fields/ attributes that can uniquely identify a record in a database.
What is a primary key?
Key identity fields for a database table.
What is a foreign key?
Enforces the relationships between two or more tables.
What is the ACID model for database transactions?
A - Atomic transactions (all or nothing)
C - Consistency of transactions
I - Isolation (one transaction at a time)
D - Durability (Once done they stay done)
What is concurrency control?
Use of things like record locks to ensure data is not overwritten.
What is cell suppression?
Encryption of a specific field to impose security.
What is polyinstantiation?
Two or more identical rows in a database designed for different classification levels.
What is noise or perturbation?
Insertion of false or misleading data into a database to thwart a confidentiality attack.
What is ODBC
database access layer to ease database interaction.
Name some example aggregation methods in SQL?
avg(), min(), max(), count(), sum()
What is an inference attack?
The combination of non-sensitive data to derive sensitive information.
What is metadata?
Data about data. More powerful than the actual data itself.