wk1 - software engineering, security, project management

0.0(0)
studied byStudied by 0 people
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/67

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:37 PM on 1/23/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

68 Terms

1
New cards

maintainability

software should be written in such a way that it can evolve to meet the changing needs of customers.

this is critical as software change is inevitable requirement of a changing business environment

2
New cards

dependability and security

should not cause physical or economic damage in the event of system failure.

malicious users should not be able to access or damage the system

3
New cards

efficiency

software should not make wasteful use of system resources such as memory and processor cycles

includes responsiveness, processing time, memory utilisation etc

4
New cards

acceptability

software must be acceptable to the type of users for which it is designed. this means it must be understandable, useable and compatible with other systems that they use.

5
New cards

progresses in software engineering

- increased ability to produce more complex systems

- effective methods to specify, design, implement software have been developed

- better understanding of the activities involved in software development

- novel software engineeering approaches

- standard notations and tools have been produced

6
New cards

who polices ethical behaviour?

many professional societies have codes of conduct

- BCS

- ACM

- IEE

but there is no requirement for a professional software engineer to be a member

7
New cards

what do all software processes involve

- specification

- design and implementation

- validation

- evolution

8
New cards

software process model

an abstract represenation of a process

it presents a description of a process from some particular perspective

9
New cards

main drawback of waterfall model

difficult to accommodate change

10
New cards

key feature from Boehm's Spiral Process Model

explicitly recognises risk

11
New cards

pros of incremental development

- cost of implementing changes is reduced

- easier to get customer feedback

- possible to delivery and deploy useful software before final product

12
New cards

cons of incremental development

- difficult for managers to measure progress

- system structure can degrade as new increments are added

13
New cards

pros of reuse-oriented software engineering

- reduced costs and risks

- faster delivery and deployment

14
New cards

cons of reuse-oriented software engineering

- compromises to accommodate limitations of existing solutions

- loss of control over evolution of reused components

15
New cards

pros of agile software engineering

- strong engagement with client

- focus is on working software

- encourages reflection on team performance and system design

16
New cards

cons of agile software engineering

- less predictable - specifications change, leading to scope creep

- less structured

- works best in small teams

17
New cards

confidentiality

information in a system may be disclosed or made accessible to people or programs that are not authorized to have access to that information

18
New cards

integrity

information in a system may be damaged or corrupted making it unusual or unreliable

19
New cards

availability

access to a system or its data that is normally available may not be possible

20
New cards

types of cyber attacks

- deliberately, for fun

- obstruct, block, deny your services

- steal info, impersonation

- modify, delete, damage data

- manipulate public opinion, fake news

21
New cards

backdoors

secret routes into software left by developers

later exploited by hackers, or developers

22
New cards

direct access

left or lost disks, flash drives

unsecured networks, laptops

23
New cards

eavesdropping

sniffing traffic going through routers

inferring data from EM waves, energy usage

24
New cards

spoofing

keyloggers used to detect password entry

steal and use another persons identity

25
New cards

trojans, viruses, worms

malware hiding inside regular software

worm viruses attached to end of data blocks

used for data tampering, keylogging

26
New cards

privilege escalation

enter system using end user privileges

get higher authorisation, up to root access

27
New cards

denial of service

overload machine, bandwidth, trigger a lockout

DDOS using a botnet

28
New cards

clickjacking

redirect web access, fake login pages, password sniffing

29
New cards

phishing

- attacker impersonates a trustworthy source

- tries to get user to input personal info

- often with URL link-shorteners to conceal redirection

- phone/email scams

30
New cards

pretexting

- plausible fabricated role play scenario to elicit information

- phone call offering to help fix a (non-existent) problem

- attacker asks user to confirm their identity

31
New cards

baiting

- infected disks, web pages with attractive content

- promise of free things if user gives identity

- leave infected flash drives around to see if you plus one in

32
New cards

sockpuppers

- robot accounts on social media

- adjusts balance of opinions, acts as a voice multiplier

33
New cards

troll armies

- organised teams of users on social media

- used to promote one side in a campaign, election or referendum

- form of state attack used by Russia, USA

34
New cards

astroturfing

- creates fake public opinion

- sometimes started by deliberately posting contrary arguments to trigger bigger desired counter response

35
New cards

authentication and authorisation

- secure user accounts with password protection

- access controls, privileged users may access specific data

36
New cards

multi factor authentication

- requires 3+ items; user ID, password, memorable info

- sometimes requires physical key / 'dongle'

37
New cards

firewalls

- shield internal network services from attacks

- perform packet filtering on external traffic

38
New cards

secure networking

- HTTPS: client server authentication using private/public key

- encrypted data transfer

- VPNs

39
New cards

physical separation

- physically separate networks, computers (no internet)

- secure room inside a Faraday cage (blocks EM)

40
New cards

cryptography

- message digests (proof of no tampering in transit)

- digital certificates (proof of origin of software, message)

- non repudiation (proof of bilateral transaction)

- confidentiality (encryption provides secrecy)

41
New cards

intrusion detection example

packet-logging systems for forensics

42
New cards

formal verification

- secure O/S or hypervisor (secure installer, service layer)

- blocks malware, installs only trusted modules

43
New cards

social countermeasures

- training in correct use of machines, networks, passwords

- training in anti-phishing, pretexting, baiting scams

44
New cards

subversion countermeasures

- education

- legislation

45
New cards

security engineering

tools, techniques and methods to support the development and maintenance of systems that can resist malicious attacks intended to damage a system or its data

a sub field of the broader field of computer security

46
New cards

Computer Misuse Act, 1990

prohibits hacking for malicious purposes

47
New cards

Human Rights Act, 1998

enshrines freedoms, especially to privacy

48
New cards

Data Protection Act, 1998

sets limits on the holding of personal data

49
New cards

Investigatory Powers Act, 2016

allows traffic monitoring for security reasons

50
New cards

General Data Protection Regulation, 2018

EU regulation on data protection and privacy.

51
New cards

Computer Misuse Act offenses

1. unauthorised access to computer material

2. unauthorised access with intent to commit or facilitate commission of further offences

3. unauthorised acts with intent to impair, or with such recklessness as to impair, operation of computer etc

4. unauthorised acts causing, or creating risk of, serious damage

5. making, supplying or obtaining articles for use in offence under 1, 3 or 4

52
New cards

Data Protection Act requirements

must make sure the information is:

- used fairly and lawfully

- used for limited, specifically stated purposes

- used in a way that is adequate, relevant and not excessive

- accurate

- kept no longer than necessary

- handled according to peoples's data protection rights

- safe and secure

- not transferred outside the european economic area without adequate protection

53
New cards

what does the Investigatory Powers Act allow UK intelligence / police to do

- targeted interceptions of communications

- bulk collection of communications data

- bulk interception of communications

- targeted hacking of devices for national security reasons

54
New cards

what does the Investigatory Powers Act require communication service providers to do

record all websites visited for 1 year

allow police access to such records without a warrant

55
New cards

investigatory powers comission

- panel of judges, who regulate application of law

- intended as a check and balance

56
New cards

UK GDPR key principles

- lawfulness, fairness and transparency

- purpose limitation

- data minimisation

- accuracy

- storage limitation

- integrity and confidentiality

- accountability

57
New cards

four 'p's of project management

people

product

process

project

58
New cards

key project management issues

- mitigate risks of failure

- satisfy customer expectations

- deliver on time and within budget

59
New cards

definition of 'customer'

your client, the person who commissions the system - you must meet his/her objectives

but he/she may not be the final end-user - may not understand all the operational issue

60
New cards

definition of 'stakeholders'

someone with a vested interest in how the system will work

sometimes conflicting interests in how the system works

need to balance interests of all these parties - deal with socio-political aspects

need to manage expectations - what is possible, desirable, impossible to deliver

61
New cards

basic idea of function point analysis

- identify main business functions

- score each on a scale based on how difficult to implement, and sum the function points

- pick a constant and multiply the function points by this constant, to yield the total size of the project

62
New cards

difficulties of function point analysis

- picking accurate size, time, cost constraints is a learned skill

- new devs typically under estimate by a factor of 3

63
New cards

risks to mitigate

- Misunderstand the customer's needs

- The project scope is poorly defined

- changes are poorly managed

- The supporting technology changes

- Business goals are changing

- Unrealistic deadlines are set

- Users resistant to new practices (power, control)

- Losing the sponsorship (funding, company champion)

- Unskilled/uncommunicative software team

- Poor management strategy (bid-to-win)

64
New cards

questions in systems development

- will the new system bring real benefits

- how to integrate with physical / legacy systems

- should physical / legacy systems be replaced?

65
New cards

coordination issues in large projects

- no one person understands the whole

- increased importance of modelling, abstract or partial views of the system, decomposition into subsystems

- increased reliance on documentation, designs, interfaces

- communication can be poor across the project as a whole

66
New cards

how can models help with communication

- offers a framework across/within teams

- clarify and documents structures and relationships

- reveals/generates new ideas and possibilities

67
New cards

how can models help with the product

- support decomposition, modular design

- support code generation using CASE tools

- support QA scenarios, test generation

68
New cards

Still learning (38)

You've begun learning these terms. Keep up the good work!

Explore top flashcards