SWE210 Software Security Week 6

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

A collection of vocabulary flashcards summarizing key concepts from the Software Security lecture on Threat Modeling.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Threat Modeling

The process of systematically analyzing a system for vulnerabilities.

2
New cards

Vulnerability

A weakness in a system that can be exploited by threats.

3
New cards

Specification Phase

The early design phase where threat modeling is most effective.

4
New cards

Security Push

A collective effort by team members to meet security goals during development.

5
New cards

Data Flow Diagram (DFD)

A tool used to track the origin, transformation, and storage of data within a system.

6
New cards

Interactors

Agents existing outside the system, providing input and consuming output.

7
New cards

Processors

Locations in a program where data is transformed or where checks are performed.

8
New cards

Trust Boundaries

Areas of differing levels of security or trust within a system.

9
New cards

DFD Symbols

Visual representations used in Data Flow Diagrams to denote various system components.

10
New cards

Spoofing

Pretending to be someone else to gain unauthorized access to systems or data.

11
New cards

Tampering

Changing data maliciously to achieve unauthorized outcomes.

12
New cards

Repudiation

Denying or disallowing an action, usually hiding tracks post-attack.

13
New cards

Information Disclosure

Exposing confidential data to unauthorized individuals.

14
New cards

Denial of Service (DoS)

An attack that makes a service unavailable to legitimate users.

15
New cards

Elevation of Privilege

Gaining higher access levels than normally permitted.

16
New cards

Threat Trees

Graphical representations showing root attacks that may lead to subsequent threats.

17
New cards

D.R.E.A.D

A risk assessment model considering Damage potential, Reproducibility, Exploitability, Affected users, and Discoverability.

18
New cards

Mitigation

The process of reducing or removing threats from a system.

19
New cards

SQL Injection

A code injection technique that attackers use to exploit vulnerabilities in databases.

20
New cards

Brute-force Attack

A method of trying multiple password combinations to gain unauthorized access.

21
New cards

Security Checkpoints

Points in the system that help verify and ensure data integrity and security.

22
New cards

Internal Threats

Risks originating from within an organization, such as employees mishandling data.

23
New cards

User Input

Data provided to the system by users, which can sometimes be exploited.

24
New cards

Access Control Mechanism

A system or method to regulate who can view or use resources within a computing environment.

25
New cards

Application Security

Measures and practices designed to protect applications from threats.

26
New cards

Iterative Process

A repetitive method working towards improvements over successive iterations.