Threats to the Software Development Security Domain
Actions for ‘Threats to the Software Development Security Domain’
After reading/viewing this week’s materials, please respond to one or more of the following questions.
- Describe the following threats to the application environment: Buffer Overflow, Denial of Service, Time of Check/Time of Use, Malformed input attacks, Object reuse, Garbage collection, and Trap door.
- Explain the following terms: file infector, boot sector infector, system infector, email virus, multipartite, macro virus, script virus, and hoax
- Explain the difference between a virus and a worm. Describe what a Trojan Horse and a Logic Bomb are.
Software Development Security Countermeasures
After reading/viewing this week’s materials, please respond to one or more of the following questions.- What is a View-based access control in database? What is a Data warehouse? What is Online Transaction Processing (OLTP)?
- What is Change Management and how is it used to control security breaches? What is Configuration Management and how is it used to control security breaches? What is Patch management and how is it used to control security breaches?
- In a database, to control security, lock controls are implemented and tested using the ACID test. Explain the following terms for each letter within the ACID method: Atomicity, Consistency, Isolation, Durability.
Week 7:Security Operations Practices.After reading/viewing this week’s materials, please respond to one or more of the following questions.
- Describe the administrative management practices of separation of duties, job rotation, and mandatory vacations and their role within operations security.
- Describe the differences between the following sanitization methods of media control: clearing, purging, zeroization, and degaussing. What is data remanence?
Operation Security Attack and CountermeasuresAfter reading/viewing this week’s materials, please respond to one or more of the following questions.
- Describe the different methods of RAID. What is RAIT?
- Define the different types of trusted recovery. What is meant by the term “fail secure”?
- Describe three of the following attack types in the Operation Security domain: man-in-the-middle, mail bombing, war-dialing, ping-of-death, teardrop, and slamming-and-cramming


0 comments