Secure by Design - Software Assurance

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key concepts from the lecture notes on Secure by Design.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

Secure by Design

An approach that treats security as a cross‑cutting concern integrated into design, not as an add‑on feature; aims to build security into the system from the start.

2
New cards

Cross-cutting concern

A concern that affects multiple parts of a system across its functionality, not confined to a single module.

3
New cards

Security as a concern vs. feature

Security should be treated as an overarching concern throughout development, not just a list of features to implement.

4
New cards

Billion Laughs attack

An XML-based attack that exploits entity expansion to create a huge memory footprint, illustrating risks of untrusted XML data.

5
New cards

CIA Triad

Confidentiality, Integrity, and Availability—the three core information security goals.

6
New cards

Confidentiality

Keeping sensitive information secret from unauthorized parties; e.g., protecting healthcare records.

7
New cards

Integrity

Ensuring information remains accurate and is changed only in authorized ways; e.g., election results not being manipulated.

8
New cards

Availability

Ensuring data and services are accessible when needed; e.g., emergency services knowing a fire location promptly.

9
New cards

Non-functional attributes

Qualities such as performance, security, maintainability, and usability that affect overall system quality.

10
New cards

Security-minded development

A mindset of consistently considering security throughout the software development process.

11
New cards

Design as conscious decision-making

Design involves deliberate choices about how a system is built, spanning code to architecture.

12
New cards

Design as guiding principle

Design acts as the overarching principle guiding both implementation and architectural decisions.

13
New cards

Traditional approach to software security

A view where developers are taught about vulnerabilities (e.g., XSS, OWASP Top 10) and rely on security experts and testers.

14
New cards

Explicit thinking about security

The idea that developers must constantly think about security during coding; can be problematic with competing goals.

15
New cards

Everyone should be a security expert

An unrealistic expectation that all developers become security experts.

16
New cards

Unknown vulnerabilities problem

Even with experts, not all potential vulnerabilities can be anticipated or countered.

17
New cards

Driving security through design

Shifting focus from reactive security measures to embedding security in the design process.

18
New cards

Secure by design advantages

Design-centered security aligns with developers’ interests, gives equal priority to business and security, enables non-security experts to write secure code, and often resolves bugs through domain focus.

19
New cards

Domain focus

Focusing on the domain helps solve many security issues implicitly and reduces design and security complexity.

20
New cards

Invariants

Constraints that must always hold for a domain object (e.g., valid usernames) to maintain security by design.

21
New cards

Data representation risk

Using overly generic types (like strings) for specific data (like phone numbers) can create security weaknesses.

22
New cards

XML parser configuration risk

Choosing XML parser settings without understanding security implications can introduce vulnerabilities; better to reject malicious XML before parsing.

23
New cards

Entity attacks

Attacks exploiting XML entities (e.g., Billion Laughs) to exhaust resources and compromise security.

24
New cards

Defense in depth

A layered security approach; secure by design promotes multi-layer protection.

25
New cards

Summary takeaway

View security as a concern, not a set of features; use design practices to guide secure solutions; design is central across levels.