Lecture 5
Lecture 5
Lecture 5
• Standards
• Legal Issues SW Rqmts/Plans
Product Design
Detailed Design
Coding
Integration
Operations/
Maintenance
• Test Plans
Coding
Integration
Operations/
Maintenance
Coding
Integration
Operations/
Maintenance
Design
Integration
Implementation
Plan
Requirements
• Develop Documentation
Detailed Design
Coding
Integration
Operations/
Maintenance
• Integration Testing
• Conduct Security-related product SW Plans &
Requirements
• Refine Documentation
Detailed Design
Coding
Integration
Operations/
Maintenance
• Complete Documentation,
Requirements
Detailed Design
Coding
Integration
Operations/
Maintenance
Management/Control Process
• Evaluate/Monitor SLA Detailed Design
Conformance
• Maintain Documentation
Coding
• Re-certification Integration
Implementation
Entry Point
Engineering
Design
Customer
Evaluation
Construction
Release
• Viruses – program code inserted into other program code with the intent of
causing an unexpected and undesirable event.
• File Infectors – attaches to program files, usually COM or EXE files and are
loaded when the program file is loaded.
• System/Boot Record Infectors – infects executable code found in certain
system areas or master boot records on the disk or to the DOS boot sector
on diskettes.
• Macro Viruses – infects applications, such as MS Word.
• Trojan Horses – a program or virus in which malicious or harmful code is
contained inside “apparently” harmless programs, data or messages.
• Logic Bombs – code inserted into an application or OS that executes when a
specified condition is met.
• Worm - a program that uses communications methods to propagate itself
between systems
• Relations - tables
• Tuples – rows or records
• Security can be provided via views – “virtual” relations
• Normalization – helps organize data and eliminate
redundancy
– First Normal Form – no repeating groups or multiple column values
– Second Normal Form – Non-key field must depend on primary key
– Third Normal Form – Non-key field cannot depend on primary key
• Referential Integrity – a system of rules used to ensure that
relationships between records in related tables are valid and
cannot be accidentally changed or deleted