Software Security Flashcards
Data normalization
ensures that attributes in a database table depend only on the primary key.
It removes redundant data and improves the integrity and availability of the database.
Which testing technique focuses only on testing the design and internal logical structure of the software product rather than its functionality?
white-box testing
Which test design typically focuses on testing functional requirements?
black-box testing
Which database feature ensures that the entire transaction is executed to ensure data integrity?
two-phase commit
Rapid Application Development (RAD)
rapidly develops software via the use of prototypes, “dummy” GUIs, back-end databases, and more.
The goal of RAD is quickly meeting the business need of the system; technical concerns are secondary.
The customer is heavily involved.
It relies on tools that enable quick development Such as: GUI builders, CASE, DBMS, OO.
Joint Analysis Development (JAD)
helps developers to work directly with users to develop a working application.
disadvantage is involvement of large numbers of users may lead to political pressures that influence against security considerations.
what is degree?
the number of columns in a table
What is cardinality?
is the number of rows.
What is Atomic values?
mean that at every row/column position in every table there is always exactly one data value and never a set of values.
What is Open Database Connectivity (ODBC)?
an application programming interface (API) that can be configured to allow any application to query databases. The
What are the security issues with ODBC?
The username and password for the database are stored in plaintext.
The actual call and the returned data are sent as cleartext over the network.
Calling applications must be checked to ensure they do not attempt to combine data from multiple data sources, thus allowing data aggregation.
Calling applications must be checked to ensure they do not attempt to exploit the ODBC drivers and gain elevated system access.
What is OLE DB?
method of linking data from different databases together.
What is ORB?
Object Request Brokers (ORBs), which can be used to locate objects: they act as object search engines.
ORBs are middleware. Common object brokers included COM, DCOM, and CORBA.
What is Normalization?
it removes redundancies in the data, and ensures that attributes in a database table depend only on the primary key.
This makes the database consistent and easy to maintain and improves the integrity and availability of the database.
What is the risk of metadata?
risk of privacy violations and integrity of data.
What is OLAP
an Online Analytical Processing (OLAP) designed to record all of the business transactions of an organization as they occur in real-time and concurrently.
How compromising database views happen?
difficulty in verifying how the software performs the view processing.
The view just limits the data the user sees; it does not
limit the operations that may be performed on the views.
the layered model frequently used in database interface design may provide multiple alternative routes to the same data, not all of which may be protected.
What is Atomicity?
is when all the parts of a transaction’s execution are either all committed or all rolled back—do it all or not at all.