Software Development Security Domain Flashcards

1
Q

The collection of all of the hardware, software and firmware within a computer system that contains all elements of the system responsible for supporting the security policy and the isolation of objects

A

Trusted Computing Bases (TCB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Takes advantage of the dependency on the timing of events that takes place in a multitasking operating system

A

Time of Check / Time of User (TOC/TOU) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Allows the operating system to provide well-defined and structured access to processes that need to use resources according to a controlled and tightly managed schedule

A

Time Multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at any time during its life cycle, and that it functions in the intended manner

A

Software Assurance (SwA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A form of rapid prototyping that requires strict time limits on each phase and relies on tools that enable quick development

A

Rapid Application Development (RAD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information about the data

A

Metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A mathematical, statistical, and visualization method of identifying valid and useful patterns in data

A

Knowledge Discovery in Databases (KDD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Development models that allow for successive refinements of requirements, design and coding

A

Iterative Models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A record of the events occuring within an organization’s systems and networks

A

Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Decribes the relationship between the data elements and provides a framework for organizing the data

A

Database Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A suite of application programs that typically manages large, structured sets of persistent data

A

Database Management Systems (DBMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The practice of examining large databases in order to generate new information

A

Data Mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An information flow that is not controlled by a security control

A

Covert Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Monitoring and managing changes to a program or documentation

A

Configuration Manegement (CM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A program written with functions and intent to copy and disperse itself without the knowledge and cooperation of the owner or user of the computer

A

Computer Virus

17
Q

A set of standards that addresses the need for interoperability between hardware and software products

A

Common Object Request Broker Architecture (CORBA)

18
Q

A Microsoft high-level interface for all kinds of data

A

ActiveX Data Objects (ADO)

19
Q

A management technique that simultaneously integrate all essential acquisition activities through the use of multidisciplinary teams to optimize the design, manufacturing, and supportability processes

A

Integrated Product and Process Development (IPPD)

20
Q

An approach based on lean and agile principles in which business owners and the development, operations, and quality assurance departments collaborate

A

DevOPS

21
Q

A development model in which each phase contains a list of activities that must be performed and documented before the next phase begins

A

Waterfall Development Model

22
Q

Maturity model focused on quality management processes and has five maturity levels that contain several key practices within each maturity level

A

Capability Maturity Model for Software (CMM or SW-CMM)