Please enable JavaScript.
Coggle requires JavaScript to display documents.
sOOPy Terms - Coggle Diagram
sOOPy Terms
Inheritance
The capability of defining a new class of objects that inherits from a parent class. New data elements and methods can be added to the new class, but the data elements and methods of the parent class are available for objects in the new class without rewriting their declarations.
Modularity
A design technique that separates the functionality of a program into independent, interchangeable components. Each component/module is self-sufficient and capable of executing a unique part of the desired functionality through well-designed interfaces
Process Isolation
A set of different hardware and software technologies designed to protect each process from other processes on the operating system. It does so by preventing process A from writing to process B.
Availability
The accessibility of a system resource in a timely manner; for example, the measurement of a system's uptime. Availability is one of the six fundamental components of information security
Field
A physical structure in a form, file or database that holds data. A field is one or more bytes in size.
Domain Seperation
A way to separate data into (and optionally to separate administration by) logically-defined domains. ... Enforce absolute data segregation between business entities (data separation).
Class
A blueprint for creating objects (a particular data structure), providing initial values for state (member variables or attributes), and implementations of behavior (member functions or methods).
Encapsulation
The idea of bundling data and methods that work on that data within one unit, e.g., a class in Java. Mechanisms that allow each object to have its data and methods.
Open Design
A form of co-creation, where the final product is designed by the users, rather than an external stakeholder such as a private company.
Layering
The organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it, and the layer below it.
Clustering
A set of loosely or tightly connected computers that work together so that, in many respects, they can be viewed as a single system. Unlike grid computers, computer clusters have each node set to perform the same task, controlled and scheduled by software
-
Least Privilege
A basic principle in information security that holds that entities (people, processes, devices) should be assigned the fewest privileges consistent with their assigned duties and functions. For example, the restrictive "need-to-know" approach defines zero access by default and then opens security as required. All data in a corporate network would be off-limits except to specific people or groups.
Super Class
In object technology, a high-level class that passes attributes and methods (data and processing) down the hierarchy to subclasses, the classes below it. Abstract superclasses are used as master structures and no objects are created for it. Concrete superclasses are used to create objects.
Abstraction
The level at which a subject is viewed or programmed. For example, the highest abstraction level of a system is the overall system, which includes everything. Each subsequent abstraction layer encapsulates the details below it.
-
Polymorphism
Meaning many shapes. In object technology, polymorphism is exhibited when a request (message) produces different results based on the object that it is sent to. For example, the command to show the cursor on-screen displays a different icon due to its current location on screen. See object-oriented programming and polymorphic virus.
Minimization
Having the least functionality necessary in a program or device; decreases the number of ways in which attackers can exploit a program or device
Data Intergity
The quality of correctness, completeness, wholeness, soundness, and compliance with the intention of the creators of the data. It is achieved by preventing accidental or deliberate but unauthorized insertion, modification or destruction of data in a database. Data integrity is one of the six fundamental components of information security