Chapter 6: Secure Coding

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Software Development Life Cycle

1 / 51

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

52 Terms

1

Software Development Life Cycle

The process that a program goes through. It consists of the development, maintenance, and demise of a software system. The phases include analysis, design, coding, testing/verification, maintenance, and obsolescence

New cards
2

Feasibility Phase

The project phase that demonstrates that the client's requirement can be achieved, this phase identifies and evaluates the options to determine the one preferred solution.

New cards
3

analysis and requirements definition phase

customer input is sought to determine what the desired functionality is

New cards
4

Design Phase

Establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation

New cards
5

Development Phase

Involves taking all of the detailed design documents from the design phase and transforming them into the actual system

New cards
6

testing and integration phase

-when development stage is complete to make sure it conforms to previous requirements of SDLC

New cards
7

User Acceptance Testing (UAT)

determine if the system satisfies the user and business requirements

New cards
8

Training and Transition Phase

acceptance, installation and deployment phase

New cards
9

Ongoing Operations and Maintenance

patching, updating, minor modifications

New cards
10

disposition phase

occurs when a product or system reaches the end of its life

New cards
11

Development Environment

An environment used to create or modify IT services or applications.

New cards
12

test environment

An environment containing hardware, instrumentation, simulators, software tools, and other support elements needed to conduct a test.

New cards
13

Staging Environment

A "production like" environment to test installation, configuration and migration scripts.

Performance testing, load testing, processes required by other teams, boundary partners, etc.

New cards
14

production environment

The environment for the actual system operation. It includes hardware and software configurations, system utilities, and communications resources. Also called the operational environment.

New cards
15

Waterfall Model

an SDLC approach that assumes the phases can be completed sequentially with no overlap

New cards
16

Spiral model

An abstract description of the systems life cycle where there are four defined quadrants - planning, risk analysis, use of design methods, client and management evaluation. Once one stage of development has gone full circle, the next please takes place, and so on until completion.

New cards
17

DevOps

Software development and information technology operations

New cards
18

toolchains

A collection of tools, to improve the coding, building and test, packaging, release, configuration and configuration management, and monitoring elements of a software development life cycle.

New cards
19

Continous Integration

A software development method where code updates are tested and committed to a development or build server/code repository rapidly

New cards
20

Continous Deployment (CD)

a software development model where application and platform updates are committed to production rapidly

New cards
21

Continuous validation

the extension of testing to support the continuous process of software development that occurs in DevOps

New cards
22

continous monitoring

Term used to describe a system that has monitoring built into it, so rather than monitoring being an external event that may or may not happen, monitoring is an intrinsic aspect of the action.

New cards
23

OWASP (Open Web Application Security Project)

Is an online community dedicated to web application security. This community works to create freely-available articles, methodologies, documentation, tools, and technologies that include web application flaws and a way to address and correct them.

New cards
24

Application programming interfaces

programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data

New cards
25

Pair Programming

agile software development technique in which two programmers work together at one workstation

New cards
26

Over the shoulder review

a form of peer review where two programmers sit down in front of the code and work through it together. One explains it to another.

New cards
27

Pass-Around Code Review

A code review process that relies on email or other distribution methods to distribute code for review.

New cards
28

Tool assisted code review

A type of peer review in which authors and reviewers use tools designed for peer code review.

New cards
29

formal code review

This type of code review is often called Fagan inspection and is common for projects that use the waterfall software development methodology. Requires a lot of meeting.

A modern adaptation is to have single meeting to review only the code changes. This way, the code can benefit from the live discussion amongst reviewers. This is sometimes known as a walkthrough.

New cards
30

Fagan inspection

A formal code review process that relies on specified entry and exit criteria for each phase

New cards
31

static code analysis

Analysis of source code carried out without execution of that software.Type of white ox tes

New cards
32

Dynamic Code Analysis

Examining code after the source code is compiled and when all components are integrated and running.

New cards
33

Fuzzing (Fuzz Testing)

A type of black box testing that enters random malformed data as inputs into software programs to determine if they will crash

New cards
34

Injection Vulnerability

A reference to a flaw in software and a common application vulnerability that would allow externally influenced (malicious) input to be used as part of the construction and subsequent execution of a command. Variations include SQL injection, OS command injection, and LDAP injection.

New cards
35

Blind SQL Injection

Is a form of SQL Injection that overcomes the lack of error messages. Without the error messages that facilitate SQL Injection, the attacker constructs input strings that probe the target through simple Boolean SQL expressions. The results are usually not visible to the attacker.

New cards
36

Blind Content-Based SQL Injection

the perpertrator sends input to the web application that tests whether the application is interpreting injected code before attempting to carry out an attack.

New cards
37

Lightweight Directory Access Protocol (LDAP)

A protocol used by various client applications when the application needs to query a database.

New cards
38

Extensible Markup Language (XML)

The markup language designed to transport and store data on the Web.

New cards
39

Cross-Site Scripting (XSS)

An attack that injects scripts into a Web application server to direct attacks at clients.

New cards
40

password authentication

Provides authentication of the user

New cards
41

Credential-stealing attacks

allow a hacker or penetration tester to authenticate directly to a service using a stolen account

New cards
42

Session Hijacking

An attack in which an attacker attempts to impersonate the user by using his session token.

New cards
43

man-in-the-middle attack

a hacker placing himself between a client and a host to intercept communications between them

New cards
44

Session Replay Attack

Attacker listens to the conversation between the user and the server and captures the authentication token of the user

New cards
45

Pass the hash

A password attack that captures and uses the hash of a password. It attempts to log on as the user with the hash and is commonly associated with the Microsoft NTLM protocol.

New cards
46

Unvalidated Redirects and Forwards

redirects: [A] can install malware or trick victims into disclosing. Attacks user

forwards: may allow access to control bypass. Attacks server

New cards
47

Unvalidated redirect

application allows redirection to any URL and attacker may use this to redirect the user to a malicious site

New cards
48

Insecure Direct Object Reference

Takes advantage of lack of checks to ensure a user requesting a resource actually has permissions to do so.

New cards
49

Directory Transversal/ Path Transversal

Read files from a web server that are outside of the websites file directory. Users shouldn't be able to browse the windows folder. Similar to Privilege escalation for for reading access.

New cards
50

Directory Transversal / Command Injection

allows the inclusion of opersators filesystem access controls dont properly restrict access to files stoed elsewhere on the server.

New cards
51

file inclusion attacks

An attack that executes the code contained within a file, allowing the attacker to fool the web server into executing arbitrary code.

New cards
52

Priviledge escalation

a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications

New cards

Explore top notes

note Note
studied byStudied by 33 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 50 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 32 people
Updated ... ago
5.0 Stars(4)
note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard26 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard45 terms
studied byStudied by 198 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard53 terms
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard21 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard36 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard25 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard54 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard322 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)