define Threat model approach STRIDE (6 steps)
what are type of threat modeling approach
what is the threat surface
the total of all of these crossing points for given perimeter or boundary. each boundary crossing is an opportunity to apply controls to mitigate attacks
what is a Simple Waterfall Software Lifecycle Development (SDLC)
the waterfall SDLC is the traditional software development methodology
phase incl.
1. concept (need identified)
2. requirement definition
3. system design
4. software and data systems coding
5. unit, subsystem and systems testing
6. acceptance testing
7. deployment to operational use
what is a source code
set of statements written in human-readable form that are implementation of given design
what is executable code (or object code)
is a binary representation of the machine language instruction set that the CPU directly execute
what is an intermediate code
in between source code and executable code
what is arbitrary code
attacker can fool the CPU into executing a different set of instructions then design for
what are the programming language generations
generation 1 : simple instruction directly to CPU
generation 2: symbols as abbreviation for major instructions
generation 3: words as part of commands
generation 4: very high-level language / report generation
generation 5: constraint-based or logic programming -> failed in 90s
what are Object-oriented language key characteristics
what is polyinstantiation
prevent inference possibilities by creating a new version of an object, using the same identifier or key
what is “distributed object-oriented systems”
distributed computing allows the sharing of resources
what is an example of approach of distributed architecture based on distributed object
COBRA / RMI / EJB / DCOM
COBRA is a set of standards that addresses the need for interoperability between hardware and software residing in different machine across network
COBRA uses an ORB (object request broker) security system to find objects
what does COBRA security service support
what is the IT supply chain (who write you source code)
Trusted
- major hardware & systems vendors
- applications software providers
- 3rd party developers
- in-house developers
Less secured/trustworthy
- Open-source providers
- citizen programmers
- mobile code
what are type of coding standard library, software reuse
what are common exploitable software source code errors
3.
what id defense programming
translates the business logic about acceptable and harmful input into code, which allow processing of the acceptable, but safely blocks attempts to input (or inject) harmful inputs
what is a covert channel
covert channel or cover path is a communication pathway between two or more processes that transfers information in ways that violate some security policy or requirement
what are types of covert channels
what are common software attack vectors
what are threats to database and data warehouse architecture
what is a data lake
refer to large collections of data that has not been put into a common format or structure for a data warehouse
what is a data farm
where predictive analytics and other techniques are used to generate data in between known or observed data points