Secure by Design Flashcards

(21 cards)

1
Q

SDLC Stages

A

Requirements, Design, Code, Testing, Release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Requirement Stage

A

Stakeholders need are gathered, analysed, and documented to define what the system must do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Design Stage

A

System architecture, components, data models, and interfaces are planned. Design flaws here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Code Stage

A

Developers write code according to the design and requirements. Security defects here implementation issues in code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Testing Stage

A

software is tested to find and fix bugs and ensure it meets requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Release Stage

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Basics of Application Security (6)

A
  • Design application with security in mind
  • Proper repository management and versioning
  • Well-defined software process
  • Code reviews and security testing
  • Secure coding training and guidelines
  • Threat modelling, penetration testing and monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the waterfall model?

A

First SDLC model where each phase must finish before the next begins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Waterfall phases

A

Requirements -> Design - > Implementation -> Validation -> Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Waterfall Disadvantages (4)

A
  • No working version until late
  • poor fit for complex projects
  • Hard to measure progress
  • Difficult to handle changing requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is agile thinking?

A

An umbrella term for frameworks and practices based on Agile Manifesto values and 12 principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Scrum used for?

A

Managing complex, adaptive problems with fast delivery and evolving requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are main steps in Scrum

A
  1. Product owner priorities work in the product backlog
  2. Scrum team delivers an increment during a sprint
  3. Team and stakeholders review and adapt
  4. Repeat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is water-scrum-fall?

A

Hybrid of waterfall and scrum used in practice but not a formal stadard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Manual Inspection and review techniques

A

Reviewing people, polices and processes for security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advantages and disadvantages of manual inspections

A

Pros: Early in SDLC, flexible, improves teamwork and understanding
Cons: Time-consuming and requires skilled analysis

17
Q

What is threat modelling?

A

A risk assessment technique that identifies threat actors and vulnerabilities by breaking down applications into assets, functionality and connectivity

18
Q

What is code review in security testing?

A

Manually analysing source code to find security weaknesses by inspecting implementation details

19
Q

What is pentration testing

A

Ethical hacking used to find exploitable vulnerabilities should be combined with other techniques and not use first

20
Q

Why is input validation

A

It protects systems by ensuring only safe and expected input is processed

21
Q

What types of input validation exists?

A

Origin - verify source (IP, API key)
Size - check input length
Lexical content - validate characters and format
Syntax - ensure correct structure
Semantics - ensure data is logical and consistent