Information and Software Security

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:36 PM on 11/4/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

55 Terms

1
New cards
2
New cards
3
New cards
4
New cards
5
New cards
What does the model train example illustrate in Domain Driven Design (DDD)?
That a model is a simplification of reality that focuses on essential aspects.
6
New cards
What is a context map used for in DDD?
To identify dependencies between different parts (bounded contexts) of the system.
7
New cards
What is a security requirement?
A representation of the expected security level of the system in relation to threats.
8
New cards
What are abuse or misuse cases used for?
To identify potential attacks by thinking like an attacker.
9
New cards
What are attack trees used for?
To identify possible attacks and infer security requirements.
10
New cards
What is the main purpose of penetration testing?
Simulating attacks to identify security weaknesses.
11
New cards
What is a limitation of penetration testing?
Fixing discovered weaknesses late in development can be very costly.
12
New cards
How does software security penetration testing differ from system penetration testing?
It focuses on finding vulnerabilities in the software itself.
13
New cards
What is the main difference between functional and risk-based security testing?
Functional testing tests security features
14
New cards
How can risk-based testing be integrated with the SDLC?
Its results can be used as input for penetration testing and code review.
15
New cards
What is the goal of Security Operations (SecOps)?
To ensure the system is secure and resistant to attacks in production.
16
New cards
What is a common pitfall in software security?
Focusing too much on penetration testing late in the development cycle.
17
New cards
Why is top management support important for software security success?
Because security requires resources that leadership must prioritize and allocate.
18
New cards
What is the OWASP Top 10?
A list of the ten most common security weaknesses in web applications.
19
New cards
What is OWASP ASVS?
A guide for developers to build secure web applications.
20
New cards
What is the main difference between BSIMM and OpenSAMM?
BSIMM is descriptive (observations)
21
New cards
Why must security champions stay motivated?
They lose interest if they don’t see the value of their work.
22
New cards
What is an SBOM (Software Bill of Materials)?
A detailed list of all components and dependencies in a software project.
23
New cards
What is the main purpose of Dependency-Track?
To continuously monitor software components for vulnerabilities.
24
New cards
What is Schneier’s Law?
Anyone can create an encryption algorithm they themselves cannot crack.
25
New cards
What is the purpose of Software Composition Analysis (SCA)?
To identify and manage third-party or open-source components in software.
26
New cards
What is the goal of SCA and SBOM together?
To improve transparency and visibility in the software supply chain.
27
New cards
What is the avalanche effect in hashing?
A small change in the input produces a completely different output.
28
New cards
What is the primary security flaw in HTTP Basic Authentication?
Passwords are transmitted as plaintext.
29
New cards
What does the principle of Default Deny mean?
Only explicitly allowed access is permitted.
30
New cards
In which phase of the Secure Software Development Lifecycle (SSDL) are SAST and DAST used?
During the Development phase.
31
New cards
What is the main weakness of the Caesar Cipher?
The keyspace is limited to the number of alphabet letters.
32
New cards
How often should an organization think about security?
Continuously.
33
New cards
What are the three main SBOM formats?
SPDX
34
New cards
What are Mikko Hyppönen’s recommendations for ransomware?
Don’t pay the ransom; Make backups.
35
New cards
What are Howell’s steps to developing security champions?
Recruit and select champions; Coach for skill development; Guide for career development.
36
New cards
What should a risk-based testing plan include?
Prioritization based on risk
37
New cards
What should be in a security incident contingency plan?
Contact info for key personnel
38
New cards
What are the BSIMM framework domains?
Governance
39
New cards
Which statements about Microsoft SDL are correct?
Originally waterfall-focused; included security training; result of Bill Gates’ Trustworthy Computing memo.
40
New cards
Which statements about security in Agile development are correct?
Agile is no excuse for skipping security; static analysis tools improve quality; Protection Poker estimates security workload.
41
New cards
Which actions improve software supply chain security?
Establish SBOM; Implement Security Champions; Use SCA to manage dependencies.
42
New cards
What are correct security principles?
Least privilege; Defense in depth.
43
New cards
What are true statements about SAST?
Analyzes source code without running it; finds vulnerabilities; can produce false positives; gives quick feedback.
44
New cards
What does Privacy by Design mean?
Privacy considerations are built into system design and development from the start.
45
New cards
What does the GDPR principle of data minimisation mean?
Only collect and process personal data necessary for a specific purpose.
46
New cards
Which standard must NoMetronome follow when handling credit card data?
PCI DSS (Payment Card Industry Data Security Standard).
47
New cards
What are the main elements of the NoMetronome system DFD?
Users
48
New cards
What does STRIDE stand for?
Spoofing
49
New cards
How do you start a STRIDE threat modelling exercise?
Create a DFD
50
New cards
Example of an attack tree (NoMetronome)?
Root: Steal credit card info → Access payment DB (SQL Injection
51
New cards
What is the significance of the Secure Software Development Lifecycle (SSDL)?
It integrates security throughout development
52
New cards
What is the principle of Defense in Depth?
Use multiple layers of protection so if one fails
53
New cards
How are cryptographic hash functions used for security?
To ensure data integrity and to securely store passwords using salted hashes (e.g.
54
New cards
Why are default credentials dangerous?
They allow attackers to gain unauthorized access if not changed; mitigation: disable or force password change.
55
New cards