Secure Software Development Flashcards

1
Q

SDLC

A

§ Software Development Life Cycle

§ SDLC is an organized process of developing a secure application throughout the life of the project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Least Privilege

A

Users and processes should be run using the least amount of access necessary to perform a given function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defense in Depth

A

Layering of security controls is more effective and secure than relying on a single control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Structured Exception Handling

A

SEH Provides control over what the application should do when faced with a
runtime or syntax error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fuzzing

A

Injection of randomized data into a software program in an attempt to find system failures, memory leaks, error handling issues, and improper input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Backdoors

A

Code placed in computer programs to bypass normal authentication and other security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Directory Traversal

A

Method of accessing unauthorized directories by moving through the directory structure on a remote server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Arbitrary Code Execution

A

Occurs when an attacker is able to execute or run commands on a victim computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Remote Code Execution (RCE)

A

Occurs when an attacker is able to execute or run commands on a remote computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Zero Day

A

Attack against a vulnerability that is unknown to the original developer or manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Buffer Overflow

A

Occurs when a process stores data outside the memory range allocated by the developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Smash the Stack

A

Occurs when an attacker fills up the buffer with NOP so that the return address may hit a NOP and continue on until it finds the attacker’s code to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cross-Site Scripting

A

Occurs when an attacker embeds malicious scripting commands on a trusted website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cross-Site Request Forgery

A

§ Occurs when an attacker forces a user to execute actions on a web server for which they are already authenticated
§ Prevent XSRF with tokens, encryption, XML file scanning, and cookie verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

XML Bomb (Billion Laughs Attack)

A

XML encodes entities that expand to exponential sizes, consuming memory on the host and potentially crashing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

XML External Entity (XXE)

A
  • An attack that embeds a request for a local resource

* To prevent XML vulnerabilities from being exploited, use proper input validation

17
Q

Race Conditions

A

A software vulnerability when the resulting outcome from execution processes is directly dependent on the order and timing of certain events, and those events fail to execute in the order and timing intended by the developer

18
Q

Dereferencing

A

A software vulnerability that occurs when the code attempts to remove the relationship between a pointer and the thing it points to.

19
Q

Time of Check to Time of Use

A

The potential vulnerability that occurs when there is a change between when an app checked a resource and when the app used the resource