mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-27 23:04:05 -06:00
vault backup: 2022-10-10 10:57:45
This commit is contained in:
parent
ed79f5fc5a
commit
91d508e64e
@ -4,6 +4,9 @@ aliases:
|
||||
tags:
|
||||
- comp210
|
||||
- lecture
|
||||
sr-due: 2022-10-13
|
||||
sr-interval: 3
|
||||
sr-ease: 250
|
||||
---
|
||||
|
||||
# why
|
||||
@ -42,7 +45,7 @@ timeline
|
||||
- agile
|
||||
|
||||
# stages
|
||||
- design
|
||||
## design
|
||||
- feasability
|
||||
- 
|
||||
- financial, legal, time, etc
|
||||
@ -60,12 +63,46 @@ timeline
|
||||
- er model etc
|
||||
- architectural design
|
||||
- structure of application
|
||||
-
|
||||
- develop
|
||||
- validaion
|
||||
- evolution
|
||||
- 
|
||||
- view model controller
|
||||
- security
|
||||
- during development not after
|
||||
|
||||
may go by different names
|
||||
## develop
|
||||
- 
|
||||
- version control
|
||||
- 
|
||||
- 
|
||||
- issue tracking
|
||||
- keep track of tasks, bugs, feature requests etc
|
||||
- unit testing
|
||||
- code reviewing
|
||||
|
||||
## validation
|
||||
- checking if system conforms to specs
|
||||
- unit testing
|
||||
- component testing
|
||||
- system testing
|
||||
- user acceptance testing (UAT)
|
||||
- 
|
||||
- finds issues that devs dont see
|
||||
- 
|
||||
- code reviews
|
||||
- better than one single person
|
||||
- different perspectives
|
||||
|
||||
## evolution
|
||||
- new requirements derived through software use
|
||||
- change in business processes occur as a result of new business opportunities
|
||||
- errors in software surface later
|
||||
- upgrade to new hardware,
|
||||
- need for improved system performance
|
||||
|
||||
# for Information assurance
|
||||
- security should be central
|
||||
- think of security every step of the way
|
||||
- code resure and (SDKs) should be critically evaluated
|
||||
- often flaws are inherited from reused llibraries or copied online code
|
||||
- where are the security knowledge gaps
|
||||
- use tools to detect vulnerabilities
|
||||
-
|
||||
14
content/notes/21-SE-in-IA-2.md
Normal file
14
content/notes/21-SE-in-IA-2.md
Normal file
@ -0,0 +1,14 @@
|
||||
---
|
||||
title: "21-SE-in-IA-2"
|
||||
aliases:
|
||||
tags:
|
||||
- comp210
|
||||
- lecture
|
||||
---
|
||||
|
||||
# need in all phases
|
||||
- often overlooked in feasability stages
|
||||
- security requirements not defined
|
||||
- built without thinking about security
|
||||
- tests do not take security into account
|
||||
- without security evolution can become cumbersome
|
||||
@ -40,3 +40,5 @@ No final exam
|
||||
- [17-ML-in-IA-1](notes/17-ML-in-IA-1.md)
|
||||
- [18-ML-in-IA-2](notes/18-ML-in-IA-2.md)
|
||||
- [19-deepfakes](notes/19-deepfakes.md)
|
||||
- [20-SE-in-IA](notes/20-SE-in-IA.md)
|
||||
-
|
||||
Loading…
Reference in New Issue
Block a user