2C Flashcards
(37 cards)
A system or network can be thoroughly protected through various security measures, but all that security can be undone if an unsecure application is installed. ___ ___ is ensuring the integrity of software.
Application security
What does SDLC stand for?
Software Development Life Cycle
The development process of an application is outlined in…?
SDLC
SDLCs are divided into ___. The number and type of ___ depends on which SDLC model is used.
phases
What are the common SDLC phases?
- Requirements Gathering and Analysis
- Design
- Implementation
- Testing
- Deployment
- Maintenance
The following describes which phase of SDLC?
Before developing an application, developers need to
know the requirements, that is, what the application is supposed to do.
Requirements Gathering and Analysis
The following describes which phase of SDLC?
Design the application using the requirements given.
Design
The following describes which phase of SDLC?
The application’s code gets written in this phase.
Implementation
The following describes which phase of SDLC?
The code must be checked for functionality, that the application does what it’s designed to do. Developers should also input random invalid data into input fields to check for crashes, memory leaks, and other bugs. This process is known as fuzzing.
Testing
The following describes which phase of SDLC?
This phase consists of installing the application on the production servers.
Deployment
The following describes which phase of SDLC?
The software’s users provide feedback to the developers. Any problems that are reported are fixed.
Maintenance
What are the two different types of SDLC models?
- Waterfall
- Agile
The following describes which type of SDLC model?
In this model, each phase of development must be completed prior to passing on to the following phase. Backtracking is not permitted, because it is considered costly to do so. The phases of the ___ SDLC include requirements gathering, system design, implementation, testing, and maintenance.
Waterfall
The following describes which type of SDLC model?
As opposed to the waterfall model, ____ allows backtracking as necessary. With ___, the development project is divided into smaller modules called sprints. Each sprint lasts approximately four weeks, after which the module would be released, and the next sprint would begin. Each sprint contains all the phases of the ____ SDLC (plan, design, build, launch, review, and test)
Agile
Best practices dictate that software developers provide ____ ____, ensuring that when data is entered into an application and buttons are pressed, the desired result happens. Ensure that no
possible keyboard characters leave room for manipulation by hackers.
input validation
Application ____ reduces security issues on a network by taking measures to prevent them in the first place.
hardening
What are some of the most common application vulnerabilities?
- Peer to Peer File Sharing
- ActiveX Controls
- Cookies
- Scripting
- Cross Site Scripting
The following describes which application vulnerability?
Files such as music, videos and software can be shared online between users using _____ applications, such as BitTorrent. This is a common method of transmitting malicious code.
Peer to Peer File Sharing
The following describes which application vulnerability?
Web sites and applications using ___ ___ can manipulate a system, obtaining full system access and potentially exploiting security vulnerabilities. On a Microsoft Internet browser, a user might be prompted to agree to run ___ ___. This practice should be discouraged
ActiveX Controls
The following describes which application vulnerability?
Web sites store ___ (small text files) client computers that contain user preferences and logon information on. If the text file is accessed by someone else, they can see the information on it. HTTP traffic is unencrypted and can be intercepted.
Cookies
The following describes which application vulnerability?
Recall from Unit 1, Risks, Threats, and Vulnerabilities, that a ___ is a list of commands to be performed by a program or scripting engine. ____ are used to automate processes on a computer and for generating web pages. This creates an application security issue
because ____ can make modifications to a system without user input.
Scripting
The following describes which application vulnerability?
_____ (XSS) is a common attack that uses JavaScript to inject malicious code into a web application. XSS can compromise user accounts, activate Trojan horse programs, mislead users into revealing private data, and enable a perpetrator to steal session cookies to impersonate users. In _____ (XSS), remember that hackers can inject malicious code into websites.
Cross-site scripting (XSS)
What are the four Application Vulnerability Prevention Techniques?
- Apply software patches
- Application configuration baseline
- Application hardening
- Cross-site request forgery prevention
The following describes which application vulnerability prevention techniques?
In addition to input validation, application security best practices dictate that any software being used should be kept up to date with the most current security patches to remove vulnerabilities. This includes both applications and operating systems.
Apply software patches