Exam 2: Software Engineering and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ provides strict access control, allowing information to flow freely between users in a computing system who have appropriate security access while preventing information leaks to unauthorized users.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

B

Why does security depend on more than technologies?

Free
(Essay)
4.9/5
(36)
Correct Answer:
Verified

To secure a software system, both technology and organization policies and personnel processes are needed. A system can have the most advanced technical protection, but it can still be compromised if the administrator is willing to give the needed information to an attacker. According to BBC news in a report published on April 2004 at the BBC Web site, 34% of respondents volunteered their computer system password when asked without even needing to be bribed. Another survey showed that, when questioned, 79% of people unwittingly gave away information that could be used to steal their identity. Social engineering attack is the practice of conning people into revealing sensitive data about a computer system, and these attacks can render any type of security measures useless. Most of the attacks are carried out by phone or in person; the attacker pretends to be an authorized user and can gain illicit access to a system. To reduce the risk of social engineering attacks, the technologies that provide security measures must be integrated into organizations' security policies and processes.

____ breaks the software code into portions that run on ordinary RAM, portions that run on read-only memory (ROM), portions that run under secure hardware, and/or portions that run remotely in a trusted location.

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

D

The _____ is specific information stored in the license that represents the uniqueness between a particular license and the environment where the software product is deployed.

(Short Answer)
4.8/5
(40)

Why are security infrastructure mismatches one of the most serious issues in software security?

(Essay)
4.9/5
(41)

What are the evaluation levels defined by the TCSEC?

(Essay)
4.8/5
(36)

The ____ model is the most fundamental process model used to build software.

(Multiple Choice)
4.9/5
(34)

_____ attack is the practice of conning people into revealing sensitive data about a computer system.

(Short Answer)
4.8/5
(23)

A security requirement is a manifestation of a high-level security policy related to the detailed requirements of a specific system.

(True/False)
4.8/5
(28)

What are the security aspects of AOP?

(Essay)
4.9/5
(35)

Before users are allowed to access any information in the MLS model, they assigned a ____ level.

(Multiple Choice)
4.8/5
(33)

Briefly describe the main characteristics of the rational unified process (RUP)?

(Essay)
4.9/5
(29)

____ channels allow information to be transmitted by mechanisms not intended for signaling information, for example, locks, system load, or CPU cycle load.

(Multiple Choice)
4.8/5
(30)

____ is by far the most talked about and widely used agile methodology, at least among software consulting professionals.

(Multiple Choice)
4.9/5
(35)

During ____, unified security architecture must be put in place to enable the system to enforce various security principles and fulfill all the use cases from requirement analysis.

(Multiple Choice)
4.8/5
(34)

What are the two procedures that should be completed before sign-off of the implementation phase of the waterfall model?

(Essay)
4.8/5
(31)
Match each item with a statement below:
describe the different approaches that can be used to attack a system
Security
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Confinement problem
the process of discovering all necessary requirements
TCSEC
Correct Answer:
Verified
Premises:
Responses:
describe the different approaches that can be used to attack a system
Security
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Confinement problem
the process of discovering all necessary requirements
TCSEC
software attack that prohibits an opponent from using a program or an entire system
Negative-use cases
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Code protection
the most widely recognized MLS model
Licensing
freedom from danger
Denial of Service (DoS)
allows a software program to run only with a matching external piece of information called a license
Requirement analysis
the standard for ranking product capabilities and trustworthiness
Bell-LaPadula security model
(Matching)
4.8/5
(32)

The MLS security model cannot be implemented on top of another base operating system.

(True/False)
4.9/5
(29)

____ is a popular AOP language based on Java.

(Multiple Choice)
4.7/5
(28)

What are some issues that can be prevented by software security?

(Essay)
4.7/5
(28)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)