• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back
Software Configuration Management
- Versioining
- Technologist
- Protection of Code
- Protection of Project
- Process Integrity
System Development Lifecycle (SDLC) ends when:
Ends when system is integrated into a production network.
System Lifecycle (SLC)
Begins after deployment and continues till disposal.
Protect Source Code from:
- Tampering
- Pirating
- Accidental loss
- Protection against attacks
Personnel Security
- Hiring Controls
- Changes in employment
- Protection of privacy from employees
Interpreted means:
Translated
Compiled means:
Coded to a particular language.
SQL Injection
Poor bounds checking
Application Security Principles
- Validate all input and output
- Fail Secure (closed depedending on envrionment)
- Fail Safe
- Make it Simple
- Defense in Depth
- Only as secure as your weakest link.
Polymorphism
Different objects will react differently to the same input.
Poly-instantiation
inference (guessing)
Transaction Processing
- Integrity
- Availability (source code escrow)
- Confidentiality
Race Condition
Related to Time of Use
Database and Data Warehousing Envirionment
- Eliminate Duplication of Data
- Consistency of Data
- Network Access
Database Management System (Network - applies to databsase model not infrastructure)
Ability to link and network different records.
Relational Database Model
- Most frequently used model
- Data are structured in tables
- Column are "variables" (attributes)
- Rows contain the specific instances (records) of data
Primary key
Unique identifier to specific record
Entity integrity
Unique non-null value in the primary key
Referential Integrity
Foreign key has to equal the primary key of the table to be joined to.
Data Warehouse
- Consolidated view of enterprise data
- Data Mart
- Designed to support decision making through data mining
Poly-instantiation
inference (guessing)
Transaction Processing
- Integrity
- Availability (source code escrow)
- Confidentiality
Race Condition
Related to Time of Use
Database and Data Warehousing Envirionment
- Eliminate Duplication of Data
- Consistency of Data
- Network Access
Database Management System (Network - applies to databsase model not infrastructure)
Ability to link and network different records.
Relational Database Model
- Most frequently used model
- Data are structured in tables
- Column are "variables" (attributes)
- Rows contain the specific instances (records) of data
Primary key
Unique identifier to specific record
Entity integrity
Unique non-null value in the primary key
Referential Integrity
Foreign key has to equal the primary key of the table to be joined to.
Data Warehouse
- Consolidated view of enterprise data
- Data Mart
- Designed to support decision making through data mining