1/37
concepts that need a little attention
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
maintainability
The ability to make modifications, extend functionality, and correct errors
Software requirements
Functional
Non Functional: Regulatory, business, user, architectural
What are the types of design?
Interface
Architectural
Detailed
Continuous
Interface design
Specifications on the interactions between a system and its environment
Architectural design
Specification of the major components of a system, properties, interfaces between these components, and their interactions
Detailed design
specifications of the internal elements of each of the system components, properties, relationships, algorithms and data structures
Continuous design
Simple specification of processes, focusing on continuously adding new features
what are the types of testing?
Unit
Integration
System
Acceptance
Unit testing
tests for specific portions of code
Integration testing
tests that modules work together
System testing
tests that the functional and operational requirements are met
Acceptance testing
tests that the users accept the software, the software meets the business case, contractual obligations, and regulatory requirements
what is a software license
Explains the terms, conditions, and warranties available
Protected by copyright law
Security architecture
the design of system components to address risks and guarantee the CIA triad principles
Digital forensic process
Identification
Collection
Examination
Analysis
Presentation
Evidence in law requirements
Probative value: ability of a piece of evidence to prove or disprove a fact that is relevant to the case
Reliability: truthfulness of a statement about facts
Authenticity: record produced by properly functioning system
Digital forensic principles
Integrity
Reliability
Chain of custody
Chain of custody
Record identifying the movement and handling of digital artifacts.
Integrity
Maintain and safeguard original conditions
Reliability
Methodology to demonstrate that a tool, technique or procedure functions correctly and as intended
Reliability validation
methodology to demonstrate that a tool, technique or procedure functions as intended
validation of methods
Assessment of if standardized sequence of steps leads to a reliable result
Questions to ask about evidence
Where does this come from?
Who gave this?
Where are the originals?
Who tested this?
What is cyber security?
Defending assets from threats with controls
What is a network?
A set of devices that are interconnected and autonomous sharing data and resources either using a wired or wireless connection
OSi model
Application
Presentation
Session
Transport
Network
Data link
Physical
TCP/IP model
Simplifies model into four layers:
Application
Transport
Internet
Access layer
Internet
Global network that provides information and communication consisting of interconnected networking, following standard protocols
Protocols
Formal set of rules that determine how data is exchanged on a network so that devices know how to communicate with eachother
What is a database
Organized collection of data that is stored and accessed electronically
Relational database
Set on mathematical set theory, comprised of tables with rows and columns.
Primary key
Unique identifier
Relationships
Connections between the tables
The Cloud
Model for providing on demand services, broad network access, scalability, and ease of maintenance by allowing access to remove servers over the internet
Infrastructure as a service
provides resources such as physical machines
Platform as a service
Provides environments such as operating systems
Software as a service
Provides applications and necessary platforms
What is an operating system?
manages a computers hardware and software resources and applications