Term
Software Configuration Mgt (SCM) |
|
Definition
- Process of creating application to include security measures to protect integrity of data & application itself.
- Develop system to track and control changes
- includes code sets, design documents, testing
|
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
- Project Initiation
- Functional design analysis & planning
- System Design specifications
- Sofware Development
- Installation/Implementation
- Operational/maintenance
- Disposal
|
|
|
Term
|
Definition
- 1st phase of SLC
- researching needs/feasibility of project
- obtain mgt approval to continue SW development
|
|
|
Term
Functional design analysis & planning |
|
Definition
- 2nd Phase of SLC
- Determine functions during project
- preparing project plan
|
|
|
Term
System Design specifications |
|
Definition
- 3rd Phase of SLC
- Detailed design of SW
|
|
|
Term
|
Definition
- 4th Phase of SLC
- Programming, testing of SW modules as developed
|
|
|
Term
Installation/Implementation |
|
Definition
- 5th phase of SLC
- Quality Assurance Team evaluates SW
- User training
- Installation on mgt approval
|
|
|
Term
|
Definition
- 6th Phase of SLC
- continual operation/maintenance of SW
- changes go through change control process
|
|
|
Term
|
Definition
- 7th Phase in SLC
- Terminating Use of SW
- Disposing system
- Security applied during/after disposal phase (ensure information in SW is secured)
|
|
|
Term
|
Definition
- Proprietary: developed by org; source code not disclosed; black box security - validated by testing, but no code inspection -> undisclosed/unexpected vulnerabilities
- Open source: sold w/source code. Code can be examined; will not fully discover all vulnerabilities, but purchaser can instead of trusting vendor
|
|
|
Term
Waterfall SW Development Model |
|
Definition
- Define process phases/steps
- Estimate phase/step time duration
- Create acceptance step @ end of each phase (aka MILESTONE)
- Continued/repeating phase (current or previous) if eval fails
- can get stuck @ step before moving onto next step
|
|
|
Term
Spiral SW Development Model |
|
Definition
- Continuous Risk Analysis
- Create stepped-out req/specs
- Develop SW from start to finish (prototype to completed product)
- Est. full SW development team w/users
- Alleviate unecessary backtracking by going through cycle again (creates upgrades/SW updates)
|
|
|
Term
|
Definition
- SLIM: Software Life Cycle Model
- COCOMO
- SLOC
|
|
|
Term
Software Life Cycle Model (SLIM) Cost Estimation Model |
|
Definition
- Feasibility
- Functinoal Specs
- SW Development
- Maintenance
|
|
|
Term
COnstructive COst MOdel (COCOMO) |
|
Definition
- Effort (E) in months
- Development (D) in months
- Estimated # of Lines of Code (KLOC) # in 1000s
- People (P) # of people to code
|
|
|
Term
Source Lines of Code (SLOC) |
|
Definition
(# Estimated code lines) * (cost of code production)
Problem: based on skill level/XP of programmers |
|
|
Term
|
Definition
- Outputs
- Inquiries
- Inputs
- Files
- Interfaces
|
|
|
Term
Capability Maturity Model (lowest to highest) |
|
Definition
- Initial
- Managed
- Defined (most org. target)
- Quantitatively Managed
- Optimizing
|
|
|
Term
Capability Maturity Model Integration |
|
Definition
process improvement proj. initative to incorp. different CMMs into 1 cohesive collection of models:
|
|
|
Term
|
Definition
- Request
- Approve
- Document
- Test/Report Results
- Implement
- Report
|
|
|
Term
Configuration Mgt Process |
|
Definition
- Config ID
- Config Change control (change mgt)
- Config status accting
- Config verification/auditing
|
|
|
Term
|
Definition
What configs are authorized/should be implemented in all current/in-use? |
|
|
Term
Config Change control (change mgt) |
|
Definition
What changes are being/have been made to authorized configs? |
|
|
Term
|
Definition
What modifications have been made or pending? |
|
|
Term
Config verification/auditing |
|
Definition
- Do configs in use match configs found in CMS?
- Any unauth/untracked modifications been made?
- Security risks associated w/unauthorized changes?
|
|
|
Term
|
Definition
std. format for storing info in a system so inf can be efficiently accessed by applications |
|
|
Term
|
Definition
- Primitive
- Array
- List
- Matrix
- Database
|
|
|
Term
|
Definition
- Data Element
- Singular
- iie. integer, string, bit, byte, octet,dates
|
|
|
Term
|
Definition
collection of primitives (iie. set of grades) |
|
|
Term
|
Definition
ordered arrays (iie. email) |
|
|
Term
|
Definition
|
|
Term
|
Definition
collection of primitives, arrays, lists, & matrices |
|
|
Term
|
Definition
- AI
- Knowledge Base (KB)
- Expert (AI + KB)
|
|
|
Term
|
Definition
set of related info organized w/SW framework for ease of access/reporting |
|
|
Term
Database Systems Features (7) |
|
Definition
- data definition lang
- query lang (iie SQL)
- indexes/keys for effcient access (table of contents)
- security structure (who can access/update DB)
- bult-in bonds/limit checking (standardized format iie Character Limit)
- enforcement of data content rules w/in DB (constraints of inputted data iie. type of data inputted vs. type of data required - alphanumeric vs numeric)
- internal integrity checks (system checks along w/DB checks)
|
|
|
Term
DataBase System Models (4) |
|
Definition
- Hierarchical DB Mgt Model
- Network DB Mgt Model
- Relational DB Mgt Model
- Object Oriented Programming (OOP) Model
|
|
|
Term
Hierarchical DB Mgt Model |
|
Definition
Tree structure w/int. DB links to higher-level elements |
|
|
Term
|
Definition
- uses pointers to other DB elements
|
|
|
Term
|
Definition
- designer creates relationships btw DB components
- Multiple tables defined
- Table relationships defined
|
|
|
Term
Object Oriented Programming (OOP) Model |
|
Definition
- data stored in container called objects
- limited control
- objects define what is accessed and who accesses it
|
|
|
Term
Database Interface Lang. (4) |
|
Definition
- Open Database Connectivity (ODBC): allows std application program interface (API) to connect (MS/SQL std)
- Java Database Connectivity (JDBC): allows Java-based programs to access DB
- eXtensible Markup Lang (XML): simplifies presentation in various formats
- Object Linking & Embedding DB (OLE DB): allows linking/embedding of docs/graphics/sound into parent doc
|
|
|
Term
|
Definition
- Table: set of rows/columns containing related info
- Tuple: row/recrod in DB
- Attribute: column/field in DB
- Cell: aka value; intersection of tuple and attribute
- Key (aka Primary Key): attribute that provides UNIQUE value in row
- Foreign Key: value that refers to KEY in different table (provides relationship btw tables)
|
|
|
Term
|
Definition
- collection of mult. tables that are related (through use of foreign keys)
- uses normalization
- reduces redundant information
- minimize # rows/columns in tables
|
|
|
Term
Object-Oriented Programming Terminology (7) |
|
Definition
- Class category
- Object type
- Modularity object does everything itself;
- Method object's abilities
- Encapsulation hides details of class hidden from object
- Abstraction generalizes classes to highest/most appropiate level for needed use
- Polymorphism classes are equal, referred to in identical terms
|
|
|
Term
ACID Integrity Terminology |
|
Definition
- Atomicity guarantee that all tasks assoc. w/transaction are completed. all or nothing.
- Consistency DB stability before a transaction can occur
- Isolation transactions/DB processes cannot see what other transactions/processs are doing. work independently
- Durability transaction maintains stability during; doesnt break down once completed
|
|
|
Term
|
Definition
- ensures data stored in DB is accurate/valid, not unknowingly altered/deleted
- ACID
|
|
|
Term
|
Definition
- ensures key references are internall consistent
- so when referencing keys, index will be have correct key references
|
|
|
Term
|
Definition
- pre-processed DB
- contains info on specific subject
- used for reporting/analysis
- cannot be updated
- updates put into new data warehouse
- iie. Voter Info
|
|
|
Term
|
Definition
- practice of analyzing large amount of data for previously unknown/hidden info using:
- Interference reviews data trends to make predictions
- Aggregation summary of info found
|
|
|
Term
|
Definition
- Access control bypass DBAs bypassing application security = unaudited/edited changes
- Aggregation unauth release of info
- Improper view restrictions unauth access to DB due to improperly configured AC
- DoS improper queries cause system to crash; thorough search on massive DB. affects unavailabilities
- Deadlocks one user's transaction locks out other users from accessing DB
|
|
|
Term
|
Definition
- Lock Controls controls who/what can be accessed (userid/pw)
- Other DBMS access controls view-based, grant & revoke, security for OODB
- Metadata controls control access to Master DB
- Data contamination controls peform data validation: checking data typing/length, bounds, well-formed transactions
- OLTP controls online transaction processing: batch vs single process - race condition; related to concurrency & atomicy
|
|
|