quiz image

Issay - longtest- finals

MarvelousMarsh avatar
MarvelousMarsh
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

stage in the software engineering process at which an executable software system is developed.

Software design and implementation

concerned with understanding how a software system should be organized and designing overall structure of that system

Architectural design

Non-functional requirements of the system

Performance , Security , Safety, Availability, Maintainability

Non-functional requirements of the system: architecture should be designed to localize critical operations within small number of components

<p>Performance</p> Signup and view all the answers

Non-functional requirements of the system: a layered structure for the architecture should be used, with the most critical assets protected in the innermost layers

<p>Security</p> Signup and view all the answers

Non-functional requirements of the system: architecture should be designed using fine-grain, self-contained components readily be changed.

<p>Maintainability</p> Signup and view all the answers

Non-functional requirements of the system: architecture should be designed so that safety-related operations are co-located in a single component

<p>Safety</p> Signup and view all the answers

Non-functional requirements of the system: architecture should be designed to include redundant components

<p>Availability</p> Signup and view all the answers

Non-functional requirements of the system

<p>Performance , Security , Safety, Availability, Maintainability</p> Signup and view all the answers

ARCHITECTURAL VIEWS

<p>Logical view, Process view, Development view, Physical view</p> Signup and view all the answers

ARCHITECTURAL VIEWS: shows the key abstractions in the system as objects or object classes.

<p>Logical view</p> Signup and view all the answers

Architectural view: shows the system hardware and how software components are distributed across the processors

<p>Physical view</p> Signup and view all the answers

ARCHITECTURAL VIEWS: shows how, at runtime, the system is composed of interacting processes.

<p>Process view</p> Signup and view all the answers

ARCHITECTURAL VIEWS: - shows how the software is decomposed for development

<p>Development view</p> Signup and view all the answers

ARCHITECTURAL VIEWS

<p>Logical view, Process view, Development view, Physical view</p> Signup and view all the answers

Separates presentation and interaction from the system data.

<p>The Model-View-Controller(MVC) Pattern</p> Signup and view all the answers

layered approach supports incremental development of systems.

<p>Layered architecture</p> Signup and view all the answers

The majority of systems that use large amounts of data are organized around a shared database or repository.

<p>Repository architecture</p> Signup and view all the answers

illustrates a commonly used runtime organization for distributed systems.

<p>Client–server architecture</p> Signup and view all the answers

Application systems are intended to meet a business or an organizational need.

<p>Application architectures</p> Signup and view all the answers

designed to process user requests for information from a database, or requests to update a database.

<p>Transaction processing systems</p> Signup and view all the answers

All systems that involve interaction with a shared database

<p>Information systems</p> Signup and view all the answers

translate one language into an alternative representation of that language and, for programming languages, may also execute the resulting code.

<p>Language processing systems</p> Signup and view all the answers

made up of interacting objects that maintain their own local state and provide operations on that state.

<p>Object-oriented system</p> Signup and view all the answers

By this stage in the design process, you should have some ideas about the essential objects in the system that you are designing.

<p>Object class identification</p> Signup and view all the answers

involve developing programs in high- or low-level programming languages.

<p>Implementation</p> Signup and view all the answers

Aspects of implementation

<p>Reuse, Configuration management, Host-target development</p> Signup and view all the answers

Aspects of implementation: Production software does not usually execute on the same computer as the software development environment.

<p>Host-target development</p> Signup and view all the answers

-Aspects of implementation: Most modern software is constructed by reusing existing components or systems.

<p>Reuse</p> Signup and view all the answers

Aspects of implementation: During the development process, many different versions of each software component are created

<p>Configuration management</p> Signup and view all the answers

Aspects of implementation

<p>Reuse, Configuration management, Host-target development</p> Signup and view all the answers

Fundamental principle of open-source development is that source code should be freely available, this does not mean that anyone can do as they wish with that code.

<p>Open-source licensing</p> Signup and view all the answers

intended to show that a program does what it is intended to do and to discover program defects before it is put into use.

<p>Testing</p> Signup and view all the answers

all testing activities that are carried out.

<p>Development testing</p> Signup and view all the answers

3 stages of development testing

<p>Unit testing, Component testing, System testing</p> Signup and view all the answers

3 stages of development testing: process of testing program components, such as methods or object classes.

<p>Unit testing</p> Signup and view all the answers

3 stages of development testing: where components integrated and the system is tested as a whole.

<p>System testing</p> Signup and view all the answers

3 stages of development testing: where several individual units integrated to create composite components.

<p>Component testing</p> Signup and view all the answers

3 stages of development testing

<p>Unit testing, Component testing, System testing</p> Signup and view all the answers

process of testing a particular release of a system that is intended for use outside of the development team.

<p>Release testing</p> Signup and view all the answers

-3 types of user testing

<p>Alpha testing, Beta testing, Acceptance testing</p> Signup and view all the answers

3 types of user testing: larger group allow to experiment and raise problems they discover

<p>Beta testing</p> Signup and view all the answers

3 types of user testing: selected group test early releases of the software.

<p>Alpha testing</p> Signup and view all the answers

3 types of user testing: customers test to decide whether or not it is ready

<p>Acceptance testing</p> Signup and view all the answers

3 types of user testing

<p>Alpha testing, Beta testing, Acceptance testing</p> Signup and view all the answers

As computer systems have become deeply embedded in our business and personal lives, the problems that result from system and software failure are increasing.

<p>Dependable Systems</p> Signup and view all the answers

Reason of Dependability of systems more important:

<p>System failures, Users often reject systems, System failure costs, Undependable systems</p> Signup and view all the answers

Reason of Dependability of systems more important:may cause information loss Data is very expensive to collect and maintain

<p>Undependable systems</p> Signup and view all the answers

Reason of Dependability of systems more important: that are unreliable, unsafe, or insecure

<p>Users often reject systems</p> Signup and view all the answers

Reason of Dependability of systems more important: affect large number of people Many systems include functionality that is rarely used.

<p>System failures</p> Signup and view all the answers

Reason of Dependability of systems more important:may be enormous For some applications, such as a reactor control system or an aircraft navigation system, the cost of system failure is orders of magnitude greater than the cost of the control system.

<p>System failure costs</p> Signup and view all the answers

Reason of Dependability of systems more important:

<p>System failures, Users often reject systems, System failure costs, Undependable systems</p> Signup and view all the answers

Designing a dependable system to consider:

<p>Hardware failure, Software failure, Operational failure</p> Signup and view all the answers

Designing a dependable system to consider :because of mistakes in its design, because of environmental factors; dampness or high temperatures

<p>Hardware failure</p> Signup and view all the answers

Designing a dependable system to consider: Human users may fail to use or operate the system as intended by its designers.

<p>Operational failure</p> Signup and view all the answers

Designing a dependable system to consider: because of mistakes in its specification, design, or implementation.

<p>Software failure</p> Signup and view all the answers

Designing a dependable system to consider:

<p>Hardware failure, Software failure, Operational failure</p> Signup and view all the answers

The dependability of a computer system is a property of the system that reflects its trustworthiness.

<p>Dependability Properties</p> Signup and view all the answers

Fault–error–failure model (Brian Randell) defined;

<p>Human error or mistake, System fault, System error, System failure</p> Signup and view all the answers

Fault–error–failure model (Brian Randell) defined; characteristic of a software system that can lead to a system error.

<p>System fault</p> Signup and view all the answers

Fault–error–failure model (Brian Randell) defined; event occurs at some point when system does not deliver service as expected by users.

<p>System failure</p> Signup and view all the answers

Fault–error–failure model (Brian Randell) defined;Human behavior that results faults into system.

<p>. Human error or mistake -</p> Signup and view all the answers

Fault–error–failure model (Brian Randell) defined;erroneous system state during execution that lead to system behavior that is unexpected by system users

<p>System error</p> Signup and view all the answers

Fault–error–failure model (Brian Randell) defined;

<p>Human error or mistake, System fault, System error, System failure</p> Signup and view all the answers

2 types of Dependability Requirements

<p>Functional requirements, Non-functional requirements</p> Signup and view all the answers

---2 types of Dependability Requirements: Define checking and recovery facilities thatshould be included in the system and features that provide protection against system failures and external attacks.

<p>Functional requirements</p> Signup and view all the answers

---2 types of Dependability Requirements---- Define the required reliability and availability of the system.

<p>Non-functional requirements</p> Signup and view all the answers

4 types of functional reliability requirement

<p>Checking requirements, Recovery requirements , Redundancy requirements , Process requirements</p> Signup and view all the answers

---4 types of functional reliability requirements--- geared to helping the system recover after a failure has occurred.

<p>Recovery requirement</p> Signup and view all the answers

---4 types of functional reliability requirements---fault-avoidance requirements, which ensure that good practice is used in the development process.

<p>Process requirements</p> Signup and view all the answers

---4 types of functional reliability requirements--- identify checks on inputs to system to ensure that incorrect or out-of-range inputs are detected before processed by system.

<p>Checking requirements</p> Signup and view all the answers

---4 types of functional reliability requirements--- specify redundant features of the system ensure that single component failure not lead to a complete loss of service.

<p>Redundancy requirements</p> Signup and view all the answers

---4 types of functional reliability requirements---

<p>Checking requirements, Recovery requirements , Redundancy requirements , Process requirements</p> Signup and view all the answers

Systems in which it is essential that system operation is always safe.

<p>Safety-critical systems</p> Signup and view all the answers

4 activities in a hazard-driven safety specification process:

<p>Hazard identification, Hazard assessment, Hazard analysis, Risk reduction</p> Signup and view all the answers

4 activities in a hazard-driven safety specification process: focuses on understanding factors lead to occurrence of hazard and consequences if incident associated with that hazard should occur.

<p>Hazard assessment</p> Signup and view all the answers

4 activities in a hazard-driven safety specification process: identifies hazards that may threaten the system.

<p>Hazard identification</p> Signup and view all the answers

4 activities in a hazard-driven safety specification process: This process is based on the outcome of hazard analysis and leads to identification of safety requirements.

<p>Risk reduction</p> Signup and view all the answers

4 activities in a hazard-driven safety specification process: -root-cause analysis that identifies the events lead to occurrence of hazard.

<p>Hazard analysis</p> Signup and view all the answers

<p>Hazard identification, Hazard assessment, Hazard analysis, Risk reduction</p> Signup and view all the answers

3 risk categories that are used in hazard assessment

<p>Intolerable risks, As low as reasonably practical (ALARP) risks,Acceptable risks</p> Signup and view all the answers

----3 risk categories that are used in hazard assessment---
those that have less serious consequences or that are serious but have a very low probability of occurrence.

<p>As low as reasonably practical (ALARP) risks</p> Signup and view all the answers

----3 risk categories that are used in hazard assessment---\ those that threaten human life.

<p>As low as reasonably practical (ALARP) risks</p> Signup and view all the answers

----3 risk categories that are used in hazard assessment---
those associated accidents normally result in minor damage.

<p>Acceptable risks</p> Signup and view all the answers

----3 risk categories that are used in hazard assessment---\

<p>Intolerable risks, As low as reasonably practical (ALARP) risks,Acceptable risks</p> Signup and view all the answers

---Software failures lead to an incorrect dose of insulin, “solutions” might be developed---

<p>Arithmetic error, Algorithmic error</p> Signup and view all the answers

---Software failures lead to an incorrect dose of insulin, “solutions” might be developed--- there is no clear program exception that must be handled.

<p>Algorithmic error</p> Signup and view all the answers

---Software failures lead to an incorrect dose of insulin, “solutions” might be developed--- occur when an arithmetic computation causes a representation failure.

<p>Arithmetic error</p> Signup and view all the answers

set of activities that check that a system will operate safely.

<p>Safety assurance</p> Signup and view all the answers

Formally verifying programs using a deductive approach is difficult and expensive, but alternative approaches to formal analysis have been developed that are based on a more restricted notion of correctness.

<p>Model checking</p> Signup and view all the answers

set of documents that includes a description of the system to be certified

<p>Safety case</p> Signup and view all the answers

The widespread adoption of the Internet in the 1990s introduced a new challenge for software engineers—designing and implementing systems that were secure.

<p>Security Engineering</p> Signup and view all the answers

---3 security dimensions---

<p>Confidentiality, Integrity, Availability</p> Signup and view all the answers

---3 security dimensions---Access to a system or its data that is normally available may not be possible.

<p>Availability</p> Signup and view all the answers

---3 security dimensions--Information in a system may be disclosed or made accessible to people or programs that are not authorized to have access to that information.

<p>Confidentiality</p> Signup and view all the answers

---3 security dimensions---may be damaged or corrupted, making it unusual or unreliable.

<p>Integrity</p> Signup and view all the answers

3 security dimensions

<p>Confidentiality, Integrity, Availability</p> Signup and view all the answers

3 level of security

<p>Infrastructure security, Application security, Operational security</p> Signup and view all the answers

3 level of security: concerned with the secure operation and use of the organization’s systems

<p>Operational security</p> Signup and view all the answers

3 level of security: concerned with maintaining the security of all systems and networks that provide an infrastructure and a set of shared services to the organization.

<p>Infrastructure security</p> Signup and view all the answers

3 level of security: concerned with the security of individual application systems or related groups of systems.

<p>Application security</p> Signup and view all the answers

3 level of security

<p>Infrastructure security, Application security, Operational security</p> Signup and view all the answers

system attribute that reflects the ability of the system to protect itself from malicious internal or external attacks.

<p>Security</p> Signup and view all the answers

---The controls that you might put in place to enhance system security are based on the fundamental notions of avoidance, detection, and recovery----

<p>Vulnerability avoidance, Attack detection and neutralization, Exposure limitation and recovery</p> Signup and view all the answers

Controls that support recovery from problems.

<p>Exposure limitation and recovery</p> Signup and view all the answers

Controls that are intended to detect and repel attacks.

<p>Attack detection and neutralization</p> Signup and view all the answers

Controls that are intended to ensure that attacks are unsuccessful.

<p>Vulnerability avoidance</p> Signup and view all the answers

Building secure systems is expensive and uncertain. It is impossible to predict costs of security failure, so companies find it difficult to judge how much should spend on system security

<p>Security and Organizations</p> Signup and view all the answers

Organizational activities focus on identifying and understanding risks to information assets (systems and data) in organization.

<p>Security risk assessment</p> Signup and view all the answers

---3 stages of risk assessment---

<p>Preliminary risk assessment, Design risk assessment, Operational risk assessment</p> Signup and view all the answers

---3 stages of risk assessment---during development life cycle and is informed by the technical system design and implementation decisions.

<p>Design risk assessment</p> Signup and view all the answers

---3 stages of risk assessment--- to identify generic risks that are applicable to system

<p>Preliminary risk assessment</p> Signup and view all the answers

---3 stages of risk assessment---focuses on use of system and possible risks that can arise.

<p>Operational risk assessment</p> Signup and view all the answers

---3 stages of risk assessment---

<p>Preliminary risk assessment, Design risk assessment, Operational risk assessment</p> Signup and view all the answers

The specification of security requirements for systems has much in common with the specification of safety requirements. You cannot specify safety or security requirements as probabilities.

<p>Security Requirements</p> Signup and view all the answers

System designers have to find a balance between security, performance, and usability

<p>Secure systems design</p> Signup and view all the answers

Secure system design means designing security into an application system.

<p>Secure systems programming</p> Signup and view all the answers

impossible to avoid system failures and so is concerned with limiting the costs of these failures and recovering from them.

<p>Resilience engineering</p> Signup and view all the answers

---3 Concepts fundamental to resilience planning---

<p>Assets, Threats, Attacks</p> Signup and view all the answers

---3 Concepts fundamental to resilience planning---circumstances can cause harm by damaging or stealing organizational IT infrastructure or system assets.

<p>Threats</p> Signup and view all the answers

---3 Concepts fundamental to resilience planning--- systems and data that have to be protected.

<p>Assets</p> Signup and view all the answers

---3 Concepts fundamental to resilience planning---manifestations of threat where attacker aims to damage or steal websites or personal data.

<p>Attacks</p> Signup and view all the answers

---3 Concepts fundamental to resilience planning---

<p>Assets, Threats, Attacks</p> Signup and view all the answers

can resist and recover from adverse incidents such as software failures and cyberattacks.

<p>Resilient systems</p> Signup and view all the answers

---Examples of controls that may be used ---

<p>Authentication , Encryption, Firewalls</p> Signup and view all the answers

---Examples of controls that may be used ---where incoming network packets are examined, then accepted or rejected according to a set of organizational rules.

<p>Firewalls</p> Signup and view all the answers

---Examples of controls that may be used --- where data is algorithmically scrambled

<p>Encryption</p> Signup and view all the answers

---Examples of controls that may be used --- users of system have to show that they are authorized to access the system.

<p>Authentication</p> Signup and view all the answers

---Examples of controls that may be used ---

<p>Authentication , Encryption, Firewalls</p> Signup and view all the answers

More Quizzes Like This

Use Quizgecko on...
Browser
Browser