Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Object reuse
Garbage Collection
Application Threats
Trap/Backdoors
Buffer Overflow
Covert Channels
Goal is to enforce an organizations
security policy and procedures in the
maintenance of CIA
CRCs
Backups
Visit us
Application Controls
Detective
Hash's
CEH
www.mindcert.com
Corrective
Control reports
Goals
Agent
Applets
proxy
Small apps
Downloaded from the web
Distributed System
Components
Java
Simple Model
Multi platform
Establishes trust between client and
server with digital certificates
Active X
Project Initiation
Formal design
CISSP
More coming soon...
Application Controls
Validity checks
Cisco
Preventative
Software development
Install
Verification
System Development
Installation
Models
Design specifications
Detail planning
Waterfall Model
Validation
Maintenance
Define objectives
Spiral Model
Disposal
Final Development
Joint Analysis Development Model (JAD)
Hierarchical
Mesh
OO
Types
Relational
Row in a relational model
A column in a data model
Element
Schema
Primary key
Foreign Key
Software maintenance
and Change Controls
Change Control
document everything
manage the upgrade
Release Control
Used to manage evolving changes to
software products
Track Versions
Issues new products
Configuration item
View
CISSP
Cell
Application and
Systems Develop
Version
Configuration Management
Configuration
Definitions
Building
Data Dictionary
Build List
Cardinality
Subtopic
Subtopic
Software Library
Select
Benefits of a formal
software process
Project
union
Three phases
Jargon
Software Development
Candidate Key
Request Control
Attribute
Data in a cell
Tuple
Primitives
Difference
Subtopic
Improved quality
Reduced life-cycle time
More accurate scheduling and meeting of
milestones
product
Level 1
Join
Intersection
Divide
Controls database access
Level 2
Non-Primitives
Important operation
Initiating
Relational Operations
View
Software Capability
Maturity Model (CMM)
Five Levels
Level 3
Level 4
Repeatable
Defined
Managing
Data Normalization
Level 5
Database concepts
and security issues
Select
Update
Delete
insert
Access Privileges
Access Privileges
SQL
Grant
Revoke
Classes
Items
Encapsulation
OOP Concepts
Security Issues
Fundamental Characteristics
Containers
Cell suppression
Data hiding
Polymorphism
OO Systems
Polyinstantiation
Inheritance
Aggregation
Inference
Messages
Called methods
Noise
Distributed Systems
Polyinstantiation
Data is normalized
Redundant data is removed
Data Warehouse
Data Mining
Data Warehousing
Metadata
Data Mart
Data Dictionary
Optimizing
Chaotic
quality is unpredictable
PM exists
No formal method
Formal processes in place
Product improvement
Process improvement
Continuous process improvement
Bugetized