9b Flashcards

(21 cards)

1
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a common challenge for modern software developers regarding security?

A

Security is often deprioritized behind performance and flexibility—until something goes wrong, making it suddenly critical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What major risk do insecure IoT systems pose?

A

They often use weak security designs and outdated components, leading to vulnerabilities like those found in hospital robots and transport systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What was the issue with Aethon TUG hospital robots?

A

Unauthenticated attackers could access hashed user credentials via HTTP GET requests; MD5 hashes used were easy to brute-force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What makes MD5 unsuitable for password hashing?

A

It is vulnerable to birthday attacks and collisions, declared formally unsuitable by 2008.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of cyberattack motivations exist?

A

Financial (e.g. ransomware), ideological (e.g. nation-state), curious or revenge-driven individuals, and opportunists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What example shows financially motivated attacks beyond ransom?

A

The Norsk Hydro attackers may have been speculating on aluminium prices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a surprising real-world hack mentioned in the slides?

A

A Polish teen used a modified TV remote to change tram tracks, demonstrating low-skill but impactful access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are mobile/pervasive systems especially vulnerable?

A

They are often built by engineers without security backgrounds, using commodity components and minimal oversight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What makes complex transport systems a cybersecurity concern?

A

They can contain thousands of Linux systems and millions of lines of code, increasing attack surface and difficulty of updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the OWASP Mobile Top 10 vulnerability M1?

A

Improper credential usage, especially hardcoded credentials, which are common and easy to exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the OWASP Mobile Top 10 vulnerability M2?

A

Inadequate supply chain security—developers failing to vet third-party components or allowing malicious updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is M3 in OWASP Mobile Top 10?

A

Insecure authentication/authorization—such as assuming backend requests are always from valid users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is M4 in OWASP Mobile Top 10?

A

Insufficient input/output validation—often underestimated but very common, enabling attacks like SQL injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is M5 in OWASP Mobile Top 10?

A

Insecure communication—such as failing to inspect TLS certificates, making apps vulnerable to man-in-the-middle attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is M6 in OWASP Mobile Top 10?

A

Inadequate privacy controls—like logging personal data or storing credentials in logs, as Facebook once did.

17
Q

What is M7 in OWASP Mobile Top 10?

A

Insufficient binary protection—allowing reverse engineering or theft of proprietary AI models in apps.

18
Q

What is M8 in OWASP Mobile Top 10?

A

Security misconfiguration—like default passwords, excessive permissions, or enabling debugging in production.

19
Q

What is M9 in OWASP Mobile Top 10?

A

Insecure data storage—storing sensitive data on mobile devices insecurely, with high risk if the device is lost.

20
Q

What is M10 in OWASP Mobile Top 10?

A

Insufficient cryptography—e.g., Sony’s ECDSA bug where non-random keys allowed attackers to extract the private key.

21
Q

What did the Colonial Pipeline attack reveal?

A

The ransomware attack halted critical infrastructure, prompting operational shutdowns and emergency declarations across multiple states.