front 1 Software Development Life Cycle (SDLC) | back 1 Initiation & Planning
Acquisition & Development
Deployment
Operation & Maintenance
Decommissioning
|
front 2 Certification | back 2
|
front 3 Accreditation | back 3
|
front 4 Certification & Accreditation = | back 4 Assessment/Evaluation & Authorization |
front 5 SSDLC (Secure SDLC) | back 5
|
front 6 Waterfall Method | back 6
|
front 7 Spiral Method | back 7
|
front 8 Agile Principles | back 8
|
front 9 Scaled Agile Framework (SAFe) | back 9
|
front 10 Scrum (Agile Method) | back 10
Scrum Roles:
|
front 11 RAD (Rapid Application Development) | back 11
|
front 12 Lean | back 12
|
front 13 Iterative vs. Non-Iterative Models | back 13
|
front 14 DevOps | back 14
|
front 15 DevSecOps / SecDevOps | back 15
|
front 16 SCA (Software Component Analysis) | back 16
|
front 17 Software Bill of Materials (SBOM) | back 17
|
front 18 Hierarchical Database | back 18
|
front 19 NoSQL Databases | back 19
|
front 20 Relational Databases | back 20
Table Terminology
Primary Key Rules (Entry Integrity)
Foreign Key Rules (Referential Integrity)
|
front 21 Database Shadowing | back 21
|
front 22 Remote Journaling | back 22
|
front 23 Database Replication | back 23
|
front 24 Data Warehousing | back 24
|
front 25 Data Mining | back 25
|
front 26 Database Query Languages | back 26 DDL (Data Definition Language)
DML (Data Manipulation Language)
DCL (Data Control Language)
TCL (Transaction Control Language)
DQL (Data Query Language)
|
front 27 Deadlocking (Deadly Embrace) | back 27
|
front 28 Inference | back 28
|
front 29 Aggregation | back 29
|
front 30 ACID Test (Transaction Integrity) | back 30 Atomicity
Consistency
Isolation
Durability
|
front 31 Metadata | back 31
|
front 32 Machine Languages | back 32 1GL – Machine Languages
2GL – Assembly Languages
3GL – High-Level Languages
4GL – Very High-Level Languages
5GL – Fifth Generation Languages
|
front 33 Object-Oriented Programming (OOP) | back 33 Objects contain:
|
front 34 OOP Concepts | back 34 Inheritance
Polymorphism
|
front 35 Class | back 35
|
front 36 Instance | back 36
|
front 37 Encapsulation | back 37
|
front 38 Polysinstantiation | back 38
|
front 39 Open System | back 39
|
front 40 Closed System | back 40
|
front 41 Open Source | back 41
|
front 42 Input Validation | back 42
|
front 43 Edit Controls | back 43
|
front 44 Bounds Checking | back 44
|
front 45 Application Attacks | back 45 Memory Buffer Overflow
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF/XSRF)
SQL Injection (SQLi)
SQLi Clues
|
front 46 OWASP Top 10 – 2017 | back 46
|
front 47 OWASP Top 10 – 2021 | back 47
|
front 48 Virus | back 48
|
front 49 Examples of Viruses | back 49 Macro Virus
Boot Sector Virus
Multipartite Virus
Armored Virus
Retro Virus
Stealth Virus
Companion Virus
Polymorphic / Metamorphic Virus
|
front 50 Worm | back 50
|
front 51 STUXNET | back 51
|
front 52 Mobile Code | back 52
|
front 53 Applets | back 53
|
front 54 Java Applets | back 54
|
front 55 ActiveX | back 55
|
front 56 Hostile Applet | back 56
|
front 57 Logic Bomb | back 57
|
front 58 Trojan Horse | back 58
|
front 59 RAT (Remote Access Trojan) | back 59
|
front 60 Rootkit | back 60
|
front 61 Kernel Rootkit | back 61
|
front 62 DDoS with Botnets | back 62
|
front 63 Ransomware / Cryptomalware | back 63
|
front 64 Cryptojacking | back 64
|
front 65 APT (Advanced Persistent Threat) | back 65
|
front 66 Fileless Malware | back 66
|
front 67 Anti-Malware Tools | back 67 1. Signature Scanning
2. Heuristic Scanning
3. Change Detection Tools
|
front 68 Covert Channel | back 68
|
front 69 Trap-Door / Back-Door | back 69
|
front 70 Sabotage | back 70
|
front 71 Phlashing | back 71
|
front 72 Data Diddling | back 72
|
front 73 Session Hijacking | back 73
Prevention Tips:
|
front 74 Race Condition | back 74
|
front 75 Memory Leak | back 75
|
front 76 TOC/TOU (Time Of Check / Time Of Use) | back 76
|
front 77 Unit Testing | back 77
|
front 78 Acceptance Testing | back 78
|
front 79 Regression Testing | back 79
|
front 80 Separation of Duties | back 80
|
front 81 Software Assurance Maturity Model (SAMM) | back 81
|
front 82 Source-Code Escrow | back 82
|
front 83 Change Management Process | back 83 Change Control Steps
Change Management Steps
Note: |