Software Development Security Domain Flashcards

1
Q

ActiveX Data Objects (ADO)

A

A Microsoft high-level interface for all kinds of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Capability Maturity Model for Software (CMM or SW-CMM)

A

Maturity model focused on quality management processes and has five maturity levels that contain several key practices within each maturity level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common Object Request Broker Architecture (CORBA)

A

A set of standards that addresses the need for interoperability between hardware and software products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer Virus

A

A program written with functions and intent to copy and disperse itself without the knowledge and cooperation of the owner or user of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Configuration Mangement (CM)

A

Monitoring and managing changes to a program or documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Covert Channel

A

An information flow that is not controlled by a security control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

The conversion of electronic data into another form; called ciphertext; which cannot be easily understood by anyone except authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Mining

A

The practice of examining large databases in order to generate new information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Database Management System (DBMS)

A

A suite of application programs that typically manages large; structured sets of persistent data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Database Model

A

Describes the relationship between the data elements and provides a framework for organizing the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DevOps

A

An approach based on lean and agile principles in which business owners and the development; operations; and quality assurance departments collaborate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Log

A

A record of the events occurring within an organization’s systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrated Product and Process Development (IPPD)

A

A management technique that simultaneously integrates all essential acquisition activities through the use of multidisciplinary teams to optimize the design; manufacturing; and supportability processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Iterative Models

A

Development models that allow for successive refinements of requirements; design; and coding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Knowledge Discovery in Databases (KDD)

A

A mathematical; statistical; and visualization method of identifying valid and useful patterns in data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Metadata

A

Information about the data.

17
Q

Rapid Application Development (RAD)

A

A form of rapid prototyping that requires strict time limits on each phase and relies on tools that enable quick development.

18
Q

Software Assurance (SwA)

A

The level of confidence that software is free from vulnerabilities; either intentionally designed into the software or accidentally inserted at any time during its life cycle; and that it functions in the intended manner.

19
Q

Time Multiplexing

A

Allows the operating system to provide well-defined and structured access to processes that need to use resources according to a controlled and tightly managed schedule.

20
Q

Time of Check/Time of Use (TOC/TOU) Attacks

A

Takes advantage of the dependency on the timing of events that takes place in a multitasking operating system.

21
Q

Trusted Computing Bases (TCB)

A

The collection of all of the hardware; software; and firmware within a computer system that contains all elements of the system responsible for supporting the security policy and the isolation of objects.

22
Q

Waterfall Development Model

A

A development model in which each phase contains a list of activities that must be performed and documented before the next phase begins.