3.7 Terms and Concepts

 <  Free Open Study  >  

program, 95

trapdoor, 112

user , 95

worm, 112

secure program, 95

rabbit, 112

penetrate and patch, 96

appended virus, 113

fault, 96

document virus, 116

program security flaw, 97

macro virus, 116

bug, 98

boot sector virus, 118

error, 98

virus signature, 120

failure, 98

polymorphic virus, 123

buffer overflow, 100

encrypting virus, 124

incomplete mediation, 104

Brain virus, 128

time-of-check to time-of-use, 106

The Internet worm, 129

malicious code, 108

Code Red, 132

rogue program, 111

web bug, 134

virus, 111

stub, 137

agent, 111

driver, 137

transient virus, 111

side effect, 138

resident virus, 111

error checking, 138

Trojan horse, 111

undefined operation, 139

logic bomb, 112

salami attack, 139

time bomb, 112

information leakage, 141

backdoor, 112

covert channel, 141

timing channel, 146

fault tree analysis, 157

software engineering, 150

regression test, 159

encapsulation, 152

black-box test, 159

information hiding, 152

clear-box test, 159

modularity, 152

independent test team, 159

maintainability, 153

configuration management, 163

understandability, 153

conditional compilation, 164

reusability, 153

proof of program correctness, 166

correctability, 153

program verification, 166

testability, 153

trusted software, 169

coupling, 153

functional correctness, 169

cohesion, 153

enforcement of integrity, 169

peer review, 154

limited privilege, 169

program design, 155

appropriate security level, 169

inspection, 155

mutual suspicion, 170

walk-through , 155

confinement, 170

review, 155

access log, 170

egoless programming, 155

development standards, 171

hazard analysis, 157

configuration management standards, 171

failure modes and effects analysis, 157

 
 <  Free Open Study  >  


Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net