MindCert CISSP Application Development MindMap
MindCert CISSP Application Development MindMap
Trap/Backdoors
Buffer Overflow
Covert Channels
Backups
Corrective
Control reports
Produce a quality product that meets users needs
Goals
Surrogate program performs services Stay within budget and time schedule
on behalf of another Agent This is the phase where the programmers
and developers get down to business of
Acts on behalf of principal but may
producing the product
hide the principal proxy
Good understanding of the needs of security will help the
Small apps developers reduce the likelihood of buffer overflow and covert
Applets Distributed System channel vulnerabilities in the final product
Downloaded from the web Components
Assumes each step can be completed
Run in constrained space without any effect from the later
Interpreted Java stages of the development
Simple Model
Multi platform Assumes any reworking will not affect previous work
Select
Improved quality
Project Benefits of a formal
Reduced life-cycle time
software process
union Primitives More accurate scheduling and meeting of
Difference milestones
product Chaotic
Initiating
Join Level 1 quality is unpredictable
Relational Operations
Intersection
PM exists
Divide Repeatable
Level 2 No formal method
Controls database access Non-Primitives
Defined from Join, project, and select Quality of the finished product is a
Important operation component of the quality of the Defined Formal processes in place
View Five Levels Level 3
Appears as a virtual table with settings Software Capability development process
that the user can view
Maturity Model (CMM)
Product improvement
Ensures that attributes in a table rely Managing
Level 4 Process improvement
only on the primary key
Eliminates repeating groups Continuous process improvement
Eliminates redundant data Data Normalization Level 5
Optimizing
Bugetized
Eliminates attributes not dependent on the primary
key
Database concepts
Select
Update
and security issues Potentially capable of being
Delete
more reliable and reduces the
possible propagation of program
insert SQL change errors
Access Privileges Grant These tell the system how to make objects, the
process of creating an object using the
Access Privileges Revoke directions in a class is called "instantiation"
Classes