








Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A comprehensive overview of software security concepts, focusing on secure software development and analysis. It covers key principles such as the cia triad (confidentiality, integrity, availability), growing trends affecting software security, and essential design principles like minimizing secrets and least privilege. The document also explores software architecture styles, including pipe and filter and distrustful decomposition, offering insights into their components, advantages, and disadvantages. It is a valuable resource for understanding the fundamentals of building secure and resilient software systems, emphasizing the importance of integrating security considerations throughout the software development lifecycle. Useful for students and professionals alike, providing a solid foundation in software security principles and practices.
Typology: Exams
1 / 14
This page cannot be seen from the preview
Don't miss anything!
What is software? - ✔✔Software is a collection of abstract artifacts. What are some characteristics of software? - ✔✔
Complex vs. Complicated - ✔✔Complex:
An architectural style describes: - ✔✔Software components:
Examples of pipe and filter - ✔✔- Unix shell scripts
Describe the Model, View, and Controller in MVC pattern - ✔✔Model:
Consequences of Decorator - ✔✔- Different types of functionality can be grouped into decorators instead of core class
Having multiple entry points providers multiple possibilities for exploitation A single entry point reduces complexity Session Pattern - ✔✔Problem: global information is stored in various places. Context: multi-user system Solution: store much information in a session object on per-user basis Solution: store such information in a session object on a per-user basis Internal checks can then be done based on the session. Typically done at login.