Ch3 Flashcards

(20 cards)

1
Q

What is insecure design in web applications?

A

Security weaknesses caused by flaws in the application’s architecture and design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are common consequences of insecure design?

A

Vulnerabilities that remain throughout the development process and expose the system to threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can insecure design be mitigated?

A

Use DevSecOps practices, perform threat modeling, secure communication, and encrypt stored data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should not be included in error messages to avoid insecure design?

A

Server-related sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is security misconfiguration?

A

Improper settings or missing security measures in any part of the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of security misconfiguration?

A

Unchanged default accounts, unnecessary features enabled, and poorly configured permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can security misconfiguration be prevented?

A

Keep software up-to-date, avoid default settings, scan for misconfigurations, restrict access to unused features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are default usernames and passwords dangerous?

A

Attackers can easily guess them and gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are vulnerable and outdated components?

A

Using software components or libraries that are no longer supported or have known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the risk of using outdated components?

A

They can become an entry point for attackers to exploit the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you mitigate the risks of outdated components?

A

Maintain an inventory of components, update regularly, and patch dependencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is it important to monitor component versions used in a system?

A

To ensure all parts of the system have the latest security patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are identification and authentication failures?

A

Failures in correctly verifying user identity, which may allow unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of authentication failures?

A

Allowing brute force, using weak/default passwords, missing session ID controls, no multi-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can authentication failures be mitigated?

A

Implement MFA, strong password policies, and monitor login attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is multi-factor authentication (MFA)?

A

A security method requiring two or more forms of verification before granting access.

17
Q

What are security logging and monitoring failures?

A

Lack of proper logging and alerting which allows attacks to go undetected.

18
Q

What is the consequence of not logging failed login attempts?

A

Brute-force or credential-stuffing attacks may go unnoticed.

19
Q

What are best practices for logging and monitoring?

A

Log all login attempts, back up logs, use tamper detection, and test alerting systems.

20
Q

Why should logs be backed up?

A

To ensure data availability and recovery in case of server failure.