Create
Learn
Share

Domain 8 Software Development Security

rename
klct555's version from 2017-06-13 05:04

Domain 8 Software Development Security

Question Answer
Activex Data Objects (ADO)A Microsoft high-level interface for all kinds of data.
Capability Maturity Model for Software (CMM or SW-CMM)Maturity model focused on quality management processes and has five maturity level that contain several key practices within each maturity level.
Common Object Request Broken Architecture (CORBA)A set of standards that addresses the need for interoperability between hardware and software product.
Computer VirusA program written with functions and intent to copy and dispense itself without the knowledge and cooperation of the owner or user of the computer.
Configuration ManagementMonitoring and managing changes to a program or documentation.
Convert ChannelAn information flow that is not controlled by a security control.
Data MiningA decision-making technique that is based on a series of analytical techniques taken from the fields of mathematics, statistics, cybernetics, and genetics.
Database Management System (DBMS)A suite of application programs that typically manages large, structured sets of persistent data.
Database ModelDescribes the relationship between the data elements and provides a framework for organizing the data.
DevOpsAn approach based on lean and agile principles in which business owners and the development, operations, and quality assurance departments collaborate.
Integrated Product and Process Development (IPPD)A management technique that simultaneously integrates all essential acquisition activities through the use of multidisciplinary teams to optimize the design, manufacturing, and supportability processes.
Iterative ModelsDevelopment models that allow for successive refinements of requirements, design, and coding.
Knowledge Discovery in Database (KDD)A mathematical, statistical, and visualization method of identifying valid and useful patterns in data.
LogA record of actions and events that have taken place on a computer system.
MetadataInformation about the data.
Rapid Application Development (RAD)A form of rapid prototyping that requires strict time limits on each phase and relies on tools that enable quick development.
Software Assurance (SwA)The level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at any time during its life cycle, and that it functions in the intended manner.
Time MultiplexingAllows the operating system to provide well-defined and structured access to processes that need to use resources according to a controlled and tightly managed schedule.
Time of Check/Time of Use (TOC/TOU) AttacksTakes advantage of the dependency on the timing of events that takes place in a multitasking operating system.
Trusted Computing Base (TCB)The collection of all of the hardware, software, and firmware within a computer system that contains all elements of the system responsible for supporting the security policy and the isolation of objects.
Waterfall Development ModelA development model in which each phase contains a list of activities that must be performed and documented before the next phase begins.
memorize

Recent badges