App Dev and Security

Cards (11)

  • Normalization
    Data reorganized in a relational database to eliminate redundancy by having all data stored in one place and storing all related items together
  • Stored procedures

    One or more database statements stored as a group in a database's data dictionary, which when called, executes all the statements in the collection
  • Code obfuscation
    The deliberate act of creating source or machine code that is difficult for humans to understand. In other words, the code is camouflaged
  • Code reuse

    Using the same code multiple times
  • Dead code

    Code that is non-executable at run-time, or source code in a program that is executed but is not used in any other computation
  • Memory management

    A resource management process applied to computer memory. It allows your computer system to assign portions of memory, called blocks, to various running programs to optimize overall system performance
  • Third-party libraries

    A library where the code is not maintained in-house
  • Software Development Kits (SDKs)

    A set of software development tools that can be installed as one unit
  • Data exposure

    Unintended exposure of personal and confidential data
  • Fuzz testing
    A software testing technique that exposes security problems by providing invalid, unexpected, or random data to the inputs of an application
  • Code signing

    The process of digitally signing (encrypting) executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed