Software Engineering Exam 2 Review Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/71

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards based on key concepts and terminology from Software Engineering Exam 2 notes across multiple chapters.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

72 Terms

1
New cards

What is the core principle of Confidentiality in secure software development?

Ensures that only authorized individuals or systems can access sensitive information.

2
New cards

What security measures support Confidentiality?

Access control mechanisms, encryption techniques, and data loss prevention strategies.

3
New cards

What does Integrity guarantee in software systems?

The accuracy and completeness of data, preventing unauthorized modification or deletion.

4
New cards

Which tools are used to ensure Integrity?

Digital signatures, hashing algorithms, and version control systems.

5
New cards

What is Availability in the context of secure software development?

Ensures that authorized users can access information and resources when needed.

6
New cards

What advanced techniques support Availability?

Redundancy, failover mechanisms, disaster recovery planning, and load balancing.

7
New cards

What is Infrastructure Security focused on?

Securing the underlying infrastructure such as networks, servers, and physical security.

8
New cards

What advanced topics are included in Infrastructure Security?

Network segmentation, zero-trust security models, and cloud security architectures.

9
New cards

What is the focus of Application Security?

Securing individual applications through secure coding practices and input validation.

10
New cards

What advanced concepts are part of Application Security?

Secure design patterns, penetration testing, and static/dynamic code analysis.

11
New cards

What does Operational Security emphasize?

Secure operation and use of systems, including security policies and user training.

12
New cards

What are the advanced topics in Operational Security?

Security awareness training, compliance with regulations, and security information management.

13
New cards

What is an Asset in security terminology?

Something of value that needs protection, like data or hardware.

14
New cards

What is an Attack in cybersecurity?

An exploitation of a system's vulnerability.

15
New cards

What does a Control do in cybersecurity?

A protective measure that reduces a system's vulnerability.

16
New cards

What does Exposure mean in security terminology?

Possible loss or harm to a computing system.

17
New cards

What is a Threat in the context of cybersecurity?

Circumstances that have the potential to cause loss or harm.

18
New cards

What is a Vulnerability?

A weakness in a computer-based system that may be exploited.

19
New cards

What is Authentication in security?

Verifying the identity of a user, device, or other entity.

20
New cards

What determines Authorization?

The permissions or access rights a user or entity is allowed.

21
New cards

Name the four types of Threats identified in cybersecurity.

Interception, interruption, modification, and fabrication.

22
New cards

What does Interception refer to in cybersecurity?

Unauthorized access to an asset.

23
New cards

What does Modification involve in cybersecurity threats?

Tampering with a system asset.

24
New cards

What does Fabrication mean in cybersecurity?

Inserting false information into a system.

25
New cards

What are the key concepts in Secure Systems Design?

Architectural design, design compromises, risk assessment, protection requirements, and distribution.

26
New cards

How does a layered architecture impact security?

It provides clear separation of concerns, enhancing security.

27
New cards

What is Protection Requirements in secure software development?

Defines how the system should protect its assets.

28
New cards

What are the goals of Security Testing?

To verify the system's ability to resist attacks.

29
New cards

What is Security Validation?

Demonstrating that the system meets its security requirements.

30
New cards

What is Experience-Based Testing?

Testing based on known attack patterns and vulnerabilities.

31
New cards

What is Penetration Testing?

Simulating real-world attacks to identify vulnerabilities.

32
New cards

What does Tool-Based Analysis involve?

Using automated tools to analyze the system for vulnerabilities.

33
New cards

What is Formal Verification?

Mathematically proving the system's security properties.

34
New cards

List the steps in the Software Evolution Process.

Change requests, impact analysis, fault repair, release planning, platform adaptation, change implementation, system enhancement, and system release.

35
New cards

What is an Emergency Repair Process?

Streamlined approach for implementing urgent changes.

36
New cards

What is a Legacy System?

An older system relying on outdated languages and technologies.

37
New cards

What are the main components of a Legacy System?

System hardware, support software, application data, business processes.

38
New cards

Name the strategies for Legacy System Management.

Scrap, maintain, transform, and replace.

39
New cards

What is the purpose of Software Reuse?

Using existing software components to build new software.

40
New cards

What are the benefits of Software Reuse?

Accelerated development, effective use of specialists, increased dependability, reduced development costs.

41
New cards

What challenges do Software Reuse practices face?

Maintaining component libraries, adapting components, increasing maintenance costs.

42
New cards

What is an Application Framework?

A set of software artifacts that collaborate to provide a reusable architecture.

43
New cards

What are Software Product Lines?

Families of related applications sharing a common architecture.

44
New cards

What does SOA stand for?

Service-Oriented Architecture.

45
New cards

What is the main focus of SOA?

Enabling applications composed of discrete, self-contained services.

46
New cards

What are the advantages of adopting a Service-Oriented Architecture?

Loose coupling, reusability, and scalability.

47
New cards

What is meant by Loose Coupling in SOA?

Minimizing dependencies between services.

48
New cards

What does the Service Registry do?

Stores information about available services for discovery.

49
New cards

What is Service Composition?

The process of combining multiple services to create a new service or application.

50
New cards

What are Workflows in the context of service-oriented software?

Logical sequences that model a business process.

51
New cards

What challenges are associated with Service Testing?

External dependencies, dynamic binding, and unpredictable non-functional behavior.

52
New cards

Define Static Metrics in software measurement.

Metrics measured without executing the software.

53
New cards

Define Dynamic Metrics in software measurement.

Metrics that require executing the software to assess.

54
New cards

What is the COCOMO model used for?

Estimating effort required for software development.

55
New cards

What factors influence software pricing?

Contractual terms, cost estimate uncertainty, financial health, market opportunity.

56
New cards

What primary factors are considered in Risk Management?

Identifying, analyzing, planning for, and monitoring risks.

57
New cards

What key differentiates Agile planning from Plan-driven development?

Agile is iterative while plan-driven is meticulously planned upfront.

58
New cards

What is the significance of proposals in project management?

They outline project objectives and execution methods to secure funding.

59
New cards

What does Software Quality encompass?

Meeting specified requirements and fulfilling its intended purpose.

60
New cards

What is meant by Fitness for Purpose?

The system fulfilling user needs beyond strict specification compliance.

61
New cards

What key attributes define Software Quality?

Reliability, usability, efficiency, maintainability, security, robustness, and reusability.

62
New cards

What does the term 'Technical Debt' refer to?

The implied cost of future refactoring due to poor design choices.

63
New cards

How do Agile practices differ from traditional quality management?

Agile emphasizes a culture of quality and team responsibility, while traditional methods rely on documentation.

64
New cards

What is the purpose of software metrics?

To assess quality, pinpoint problems, and improve processes.

65
New cards

What is the importance of the ISO 9001 standard?

Provides a quality management framework, though it's often critiqued for focusing too much on conformity.

66
New cards

How can statistical models assist in maintenance prediction?

They can provide insights into which parts of a system may cause future problems.

67
New cards

What is Service-Oriented Development?

Developing systems by linking shared services for interoperability.

68
New cards

What is the role of tools in Software Analytics?

To analyze datasets to gain insights for decision-making.

69
New cards

What is Configuration Management in software?

Managing software versions and changes throughout the lifecycle.

70
New cards

Why is effective communication important in project management?

It ensures clarity and coordination among team members and stakeholders.

71
New cards

What is the purpose of a Risk Analysis in project management?

To assess risks' likelihood and consequences for better planning.

72
New cards

What are the two primary types of software metrics?

Product metrics and process metrics.