Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

36 Cards in this Set

  • Front
  • Back
What are the 6 stages to the Software Life Cycle
1. Initiation - Key phase, prjct proposal and risk analysis.
2. Analysis - security requirements and Baselines outlined.
3. System Specification - explores how the software will interact with networks, internet, etc.
4. Design and Development - Actual code is created.
5. Implementation - software project released & installed. accreditation and certification are initiated and completed.
6. Maintenance - any software changes or updates. Continuous audit.
Waterfall Software Development Model
Requires edit completion before moving to the next phase. No changes are allowed to a past phase.
Name 3 different Waterfall Software Development Models
1. Computer Aided Software Engineering(CASE) - commonly used with large projects.
2. Structured Programming Development Model(SPDM) - often pieces are developed separately.
3. Systems Development Life Cycle(SDLC) - Uses project management to control development.
Iterative Software Development Model
A method of designing and creating software that separates a project into smaller more manageable pieces, allowing independent development of each piece.
Name 3 different Iterative Software Development Models
1. Object Oriented Programming(OOP) - canned code i.e. VB, Java.
2. Sprial Model - uses prototypes
3. Cleanroom - used when projects need accreditation and certification.
Name 2 different Iterative Software Development Model Types
1. Joint Analysis Development (JAD) - Involves end users and developers during all phases
2. Rapid Application Development(RAD) - uses unmovable deadlines to drive the project
Basic Constructive Cost Model(COCOMO)
Determines the total number of months a project will take to complete.
Detailed COCOMO
Determines development time and cost using the basic method as well as personnel and hardware constraints, tools, etc.
Function Point Measurement Model
Determines development time using input types from both external and internal sources, file types, and external inquiries.
Software Life Cycle Model(SLIM)
Determines the total number of months a project will take to complete and its cost using the number of software instructions for a simple project to estimate the end result.
Software Capability Maturity Model
A five level model that evaluates an organization's software development process. Higher levels of maturity indicate the project's dedication to improvement. Lower levels of maturity indicate a lack of procedure.
Name the 5 levels of the Software Capabiltiy Maturity Model
1. Initiate
2. Repeatable
3. Defined
4. Managed
5. Optimized
Name the 3 processed for Change Control
1. Request
2. Process
3. Release
Configuration Management
Is a mechanism that monitors the entire Software Life Cycle. It addresses change control and ensures all personnel remain accountable for their part of the process.
Common Object Request Broker Architecture(CORBA)
Allows all components to process requests and responses from each other.
Component Object Model(COM)
Addresses software components and their functions. Functions are not dependent on rules of language
Distributed Componenet Object Model (DCOM)
Same as COM but works with distributed systems.
Object Linking and Embedding (OLE)
Allows computer wide components to function with all software types.
Open Database Connectivity (ODBC)
Allows for database access using SQL
Object Request Broker (ORB)
Addreses System components.
What are the 2 types of Artificial Intelligence(AI)
1. Expert Systems - software program designed to answer complex questions in the form of a human export. Can incorporate fuzzy logic.
2. Neural Networks - Functions similar to the human brain.It learns over time. Also can use fuzzy logic.
Security Controls
The mechanisms used to handle software threats. No single control will address all possible threats. (i.e. secure state, AV, Backup, Password, Security kernal)
Distributed Database System
Utilizes data from multiple source databases, which reside in different places.
Hierarchical Database System
Utilizes a tree structure with all data stemming from a root and branching into parent and child relationship
Object Oriented Database System
Utilizes multiple data types, which are located using objects stored in the data keying tothe actual item (i.e. active directory)
Relational Database System
Utilizes a column and row data orientation with headers and primary keys to locate attributes (i.e. Access)
What are the 3 types of Database Integrity?
1. Entity integrity - ensures data rows have a unique identity.
2. Referential integrity - ensures an identifier from one table references an existing correct identifier in another.
3. Semantic integrity - ensures that database rules are enforced.
Data Warehouse
Database management mechanism that allows the storing of data from multiple databases. It requires all data to be of similar type.
Data Mining
A method of analyzing that data stored within a data warehouse. Performed using queries.
Aggregation Database Threat
Access of part of classified information by unauthorized users.
Bypass Attacks
Going around security mechanisms to access unauthorized information.
Concurrency Database Threat
Simultaneous activity on a single point of data
Incorrect or incomplete data is entered into the database
Simultaneous attempts to access a single point of data, causing both users to be denied access.
Polyinstantiation Database Threat
Storing of identical data in multiple locations.
Online Transaction Processing (OLTP)
Using unauthorized query tools to access the database.