Cloud Applications Flashcards

1
Q

Qualitative risk analysis

A

is the process of rating or scoring risk based on a person’s perception of the severity and likelihood of its consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Quantitative risk analysis

A

is the process of calculating risk based on data gathered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the S.T.R.I.D.E threat model?

A

Spoofing Identity, Tampering with data, Repudiation, Information Disclosure, Denial of Service, Elevation of privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spoofing Identity

A

illegally accessing and then using another user’s authentication information, such as username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tampering with data

A

involves the malicious modification of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Repudiation

A

users who deny performing an action without other parties having any way to prove otherwise—for example, a user performs an illegal operation in a system that lacks the ability to trace the prohibited operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information disclosure

A

the exposure of information to individuals who are not supposed to have access to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Elevation of privilege

A

an unprivileged user gains privileged access and thereby has sufficient access to compromise or destroy the entire system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

D.R.E.A.D (Risk Assessment Model)

A

Damage, Reproducibility, Exploitability, Affected users, Discoverability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is D.R.E.A.D?

A

is part of a system for risk-assessing computer security threats previously used at Microsoft and although currently used by OpenStack and other corporations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is PTA?

A

PTA (Practical Threat Analysis) is a risk assessment methodology and a suite of software tools that enable users to find the most beneficial and cost-effective way to secure systems and applications according to their specific functionality and environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rapid Application Development

A

is a form of agile softwaredevelopmentmethodology that prioritizesrapidprototype releases and iterations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Systems Development Life Cycle (SecSDLC)

A

a methodology for the design and implementation of an information system in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OpenID

A

it allows users to be authenticated by co-operating sites using a third-party service, eliminating the need for webmasters to provide their own ad hoc login systems, and allowing users to log into multiple unrelated websites without having to have a separate identity and password for each

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OAuth

A

is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WS-Federation (Web Services Federation)

A

is an Identity Federation specification, developed by a group of companies: BEA Systems, BMC Software, CA Inc. (along with Layer 7 Technologies now a part of CA Inc.), IBM, Microsoft, Novell, HP Enterprise, and VeriSign.

17
Q

web application firewall (WAF)

A

is an application firewall for HTTP applications. It applies a set of rules to an HTTP conversation.

18
Q

XML appliance

A

is a special-purpose network device used to secure, manage and mediate XML traffic

19
Q

Tokenization

A

is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value.

20
Q

Data masking

A

is the process of hiding original data with modified content (characters or other data.)

21
Q

SQL injection

A

is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

22
Q

Weak Authentication

A

Weak authentication has many facets, ranging from brute forcing of the user interface to insecure storage of the database credentials used by an application.

23
Q

Privilege abuse

A

Users may abuse legitimate data access privileges for unauthorized purposes

24
Q

Excessive privileges

A

If users hold privileges that exceed the requirements of their job function, these privileges may be abused by the individual or an attacker who compromises their account.

25
Inadequate logging and weak auditing
Logging and auditing are key to deterring and detecting misuse and enabling adequate investigation of suspected data compromise.
26
Denial of service
attacks from the internet, can overwhelm your system regardless of the capacity of its internet connection
27
Exploiting unpatched services
While up-to-date patching won’t make you secure, operating vulnerable unpatched services will significantly increase the likelihood of being compromised.
28
Inference Attack
is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database.
29
Directory Traversal attack
is an HTTP attack that allows attackers to access restricted directories and execute commands outside of the web server’s root directory.
30
Cross-site scripting
attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites