Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
36 Cards in this Set
- Front
- Back
What are the 6 stages to the Software Life Cycle
|
1. Initiation - Key phase, prjct proposal and risk analysis.
2. Analysis - security requirements and Baselines outlined. 3. System Specification - explores how the software will interact with networks, internet, etc. 4. Design and Development - Actual code is created. 5. Implementation - software project released & installed. accreditation and certification are initiated and completed. 6. Maintenance - any software changes or updates. Continuous audit. |
|
Waterfall Software Development Model
|
Requires edit completion before moving to the next phase. No changes are allowed to a past phase.
|
|
Name 3 different Waterfall Software Development Models
|
1. Computer Aided Software Engineering(CASE) - commonly used with large projects.
2. Structured Programming Development Model(SPDM) - often pieces are developed separately. 3. Systems Development Life Cycle(SDLC) - Uses project management to control development. |
|
Iterative Software Development Model
|
A method of designing and creating software that separates a project into smaller more manageable pieces, allowing independent development of each piece.
|
|
Name 3 different Iterative Software Development Models
|
1. Object Oriented Programming(OOP) - canned code i.e. VB, Java.
2. Sprial Model - uses prototypes 3. Cleanroom - used when projects need accreditation and certification. |
|
Name 2 different Iterative Software Development Model Types
|
1. Joint Analysis Development (JAD) - Involves end users and developers during all phases
2. Rapid Application Development(RAD) - uses unmovable deadlines to drive the project |
|
Basic Constructive Cost Model(COCOMO)
|
Determines the total number of months a project will take to complete.
|
|
Detailed COCOMO
|
Determines development time and cost using the basic method as well as personnel and hardware constraints, tools, etc.
|
|
Function Point Measurement Model
|
Determines development time using input types from both external and internal sources, file types, and external inquiries.
|
|
Software Life Cycle Model(SLIM)
|
Determines the total number of months a project will take to complete and its cost using the number of software instructions for a simple project to estimate the end result.
|
|
Software Capability Maturity Model
|
A five level model that evaluates an organization's software development process. Higher levels of maturity indicate the project's dedication to improvement. Lower levels of maturity indicate a lack of procedure.
|
|
Name the 5 levels of the Software Capabiltiy Maturity Model
|
1. Initiate
2. Repeatable 3. Defined 4. Managed 5. Optimized |
|
Name the 3 processed for Change Control
|
1. Request
2. Process 3. Release |
|
Configuration Management
|
Is a mechanism that monitors the entire Software Life Cycle. It addresses change control and ensures all personnel remain accountable for their part of the process.
|
|
Common Object Request Broker Architecture(CORBA)
|
Allows all components to process requests and responses from each other.
|
|
Component Object Model(COM)
|
Addresses software components and their functions. Functions are not dependent on rules of language
|
|
Distributed Componenet Object Model (DCOM)
|
Same as COM but works with distributed systems.
|
|
Object Linking and Embedding (OLE)
|
Allows computer wide components to function with all software types.
|
|
Open Database Connectivity (ODBC)
|
Allows for database access using SQL
|
|
Object Request Broker (ORB)
|
Addreses System components.
|
|
What are the 2 types of Artificial Intelligence(AI)
|
1. Expert Systems - software program designed to answer complex questions in the form of a human export. Can incorporate fuzzy logic.
2. Neural Networks - Functions similar to the human brain.It learns over time. Also can use fuzzy logic. |
|
Security Controls
|
The mechanisms used to handle software threats. No single control will address all possible threats. (i.e. secure state, AV, Backup, Password, Security kernal)
|
|
Distributed Database System
|
Utilizes data from multiple source databases, which reside in different places.
|
|
Hierarchical Database System
|
Utilizes a tree structure with all data stemming from a root and branching into parent and child relationship
|
|
Object Oriented Database System
|
Utilizes multiple data types, which are located using objects stored in the data keying tothe actual item (i.e. active directory)
|
|
Relational Database System
|
Utilizes a column and row data orientation with headers and primary keys to locate attributes (i.e. Access)
|
|
What are the 3 types of Database Integrity?
|
1. Entity integrity - ensures data rows have a unique identity.
2. Referential integrity - ensures an identifier from one table references an existing correct identifier in another. 3. Semantic integrity - ensures that database rules are enforced. |
|
Data Warehouse
|
Database management mechanism that allows the storing of data from multiple databases. It requires all data to be of similar type.
|
|
Data Mining
|
A method of analyzing that data stored within a data warehouse. Performed using queries.
|
|
Aggregation Database Threat
|
Access of part of classified information by unauthorized users.
|
|
Bypass Attacks
|
Going around security mechanisms to access unauthorized information.
|
|
Concurrency Database Threat
|
Simultaneous activity on a single point of data
|
|
Contamination
|
Incorrect or incomplete data is entered into the database
|
|
Deadlocking
|
Simultaneous attempts to access a single point of data, causing both users to be denied access.
|
|
Polyinstantiation Database Threat
|
Storing of identical data in multiple locations.
|
|
Online Transaction Processing (OLTP)
|
Using unauthorized query tools to access the database.
|