Overview of Software Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

flashcard set

Earn XP

Description and Tags

Flashcards reviewing key concepts related to software security, its importance, terminology, risk management, and integrating security into the Software Development Lifecycle.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

What is software security?

Engineering software so that it continues to function correctly under malicious attack.

2
New cards

Why is software security important?

Most software systems today are insecure and contain numerous flaws and bugs that attackers exploit.

3
New cards

What are defects in software security?

Implementation vulnerabilities and design vulnerabilities.

4
New cards

What is the difference between bugs and flaws?

Bugs are implementation-level errors, while flaws are problems at a deeper design level.

5
New cards

What is a risk in the context of software security?

The probability that a flaw or bug will impact the purpose of the software, calculated as risk = probability x impact.

6
New cards

What are the three pillars of software security?

Risk management, touchpoints, and knowledge.

7
New cards

What are common reasons for insecure software?

Lack of education in secure methods, lack of integration with the OS, lack of testing, and poor development environments.

8
New cards

What activities are included in Risk Management Framework (RMF)?

Understanding business context, identifying risks, prioritizing risks, and implementing risk mitigation strategies.

9
New cards

What is the purpose of architectural risk analysis?

To track risk over time and link system-level concerns to probability and impact measures.

10
New cards

What is an abuse case in software security?

Determining what the software can't and won't do, anticipating abnormal behaviors.

11
New cards

What should security requirements satisfy?

They must be explicitly defined, consider assumptions about system behavior, and meet defined security goals.

12
New cards

What is the role of security operations in software security?

To integrate software security with network security operations by understanding software behavior to prevent successful attacks.

13
New cards

What is the goal of integrating security into each phase of the Software Development Lifecycle (SDLC)?

To ensure that security considerations are embedded from planning to maintenance.

14
New cards

What are key practices during the implementation phase of the SDLC?

Educating developers on secure coding practices and implementing regular security-focused code reviews.

15
New cards

What should be done during the maintenance phase of software security?

Keep software and dependencies updated and develop an incident response plan.

16
New cards

What are the goals of risk-based security testing?

To test areas of code where an attack is likely to succeed and to identify and rank risks based on a risk-based approach.