13 - Software Security

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

This set of flashcards covers key vocabulary terms related to software security, their definitions, and practices for maintaining security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Confidentiality

Protecting information from being accessed by unauthorized parties.

2
New cards

Integrity

Ensures that information is not altered and the source of the information is genuine.

3
New cards

Availability

Ensuring that information is accessible by authorized users.

4
New cards

Authentication

Process of uniquely identifying the clients of your applications and services.

5
New cards

Non-repudiation

Ensures that a user cannot deny performing an operation or initiating a transaction.

6
New cards

Authorization

Process of ensuring the right user can access only what they are supposed to do.

7
New cards

Threat modeling

A practice that allows development teams to consider, document, and discuss security implications in context.

8
New cards

Vulnerability

A weakness in some aspect of a system that makes a threat possible.

9
New cards

Countermeasure

A safeguard that addresses a threat and mitigates risk.

10
New cards

Spoofing

Attempting to gain access to a system by using a false identity.

11
New cards

Tampering

Malicious modification of data.

12
New cards

Denial of Service (DoS)

Denying service to valid users.

13
New cards

Elevation of Privilege

Unprivileged user gains privileged access.

14
New cards

Fuzz testing

Generating random invalid/malformed inputs to test a program.

15
New cards

Penetration testing

Simulates a hacker's actions to find vulnerabilities in a system.

16
New cards

Dynamic Application Security Testing (DAST)

Tools that perform attacks and check the application’s ability to handle these threats.

17
New cards

Secure Coding Standards

Guidelines that help developers write secure code.

18
New cards

Static Analysis

Method of debugging by examining code without executing it.

19
New cards

Incident response process

A pre-prepared approach for handling security incidents.

20
New cards

Risk assessment

The process of identifying and analyzing potential issues that could negatively impact key business initiatives.

21
New cards

Cybersecurity hygiene

The practice of employing basic cybersecurity measures to protect systems and information.