csf Flashcards

(17 cards)

1
Q

What are the two categories of software?

A
  • Application Software (e.g., MS Office)
  • System Software (e.g., MS Windows)

Application software is designed for end-users, while system software manages and controls hardware components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What defines software vulnerabilities?

A
  • Existence of a flaw in the software
  • Possibility of the attacker gaining access to the flaw
  • Ability of the attacker to exploit that flaw

Vulnerabilities can allow hackers or malware to exploit software for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of software patching?

A

To ensure that all systems have up-to-date patches to prevent exploitation of known vulnerabilities

Regular patching is a crucial security practice to maintain software integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What principle does Access Management enforce?

A

The principle of Least Privilege

This principle minimizes access privileges required to perform job functions, reducing the attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a web application?

A

Application software that runs on a web server and is accessed through a web browser

Web applications differ from traditional software as they rely on network connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What organization is the Open Web Application Security Project Foundation (OWASP)?

A

A non-profit organization aimed at spreading awareness of software security globally

OWASP provides resources like the OWASP Top 10 list of critical security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the OWASP Top 10?

A

A list of the most common and critical security risks seen in web applications

Each risk is ranked based on various factors like exploitability and impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is SQL Injection?

A

A vulnerability that allows an attacker to manipulate SQL queries to gain unauthorized access to a database

It often occurs due to insufficient validation of user input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does Cross-Site Scripting (XSS) target?

A

The users of the web application, not the application itself

XSS involves executing malicious code in the context of a legitimate website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of input validation?

A

To verify if the type of input submitted by a user is allowed

Input validation ensures that only acceptable data is processed by the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are cookies?

A
  • Small text files stored on a user’s computer by a web server
  • Used to identify users and store preferences

Cookies play a critical role in user sessions and personalization on websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How are sessions defined in web applications?

A

Server-side storage of information about the user’s interaction with the web application

Sessions begin when a user logs in and end when they log out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Cross-Site Request Forgery (CSRF)?

A

An attack that tricks a user into executing unwanted actions on a web application where they are authenticated

CSRF exploits the user’s active session to perform unauthorized actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a technique to prevent XSRF attacks?

A

Use of a challenge token or an unpredictable token in HTTP requests

Tokens should be unique per user session to enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does CAPTCHA stand for?

A

Completely Automated Public Turing test to tell Computers and Humans Apart

CAPTCHA helps distinguish between human users and automated bots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the impact of software vulnerabilities?

A

They can negatively affect the performance and security of software

Vulnerabilities can lead to data breaches and unauthorized access.

17
Q

What is the recommended reading for SQL Injection attacks?

A

https://www.w3schools.com/sql/sql_injection.asp

This resource provides detailed information on SQL injection vulnerabilities and prevention methods.