Domain 4: Application Security Flashcards

1
Q

API - 2 types

A

REST - Representative State Transfer:
Allows for cashing for for performance and scalability.
HTTP, JSON, XMF

SOAP - Simple Object Access Protocol
Structured Format. Only XML formatted data, no cashing, lower performance, no scalability
HTTP, FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud environment challenges

A

Modern programming languages and development methodologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OWASP Top 10

A

A1 - Broken Access Control
A2 - Cryptographic Failure
A3 - Injection
A4 - Insecure Design
A5 - Security MIsconfiguration
A6 - Vulnerable and Outdated Components
A7 - Identification and Authentication Failures
A8 - Software and Data Integrity Failures
A9 - Security Logging and Monitor Failures
A10 - Server Side Request Forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Function Testing

A

Test against a particular function or component of a system or application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dynamic Application Security Testing (DAST)

A
  • Black box

- Run against live systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Runtime Application Self-Protection (RASP)

A

Run against systems that have the ability to tune and focus their security measures based on actual environment variables and particular attack methods being used against them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Static Application Security Testing (SAST)

A
  • White box - access to secure code
  • Code is tested offline and not against production systems
  • Particularly good for catching programming errors and vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Approved APIs

A

Ensure they undergo evaluation and security testing

Ensure TLS or SSL encryption used properly meet guidelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software Development Lifecycle SDLC

A
  1. Requirement Gather and Feasibility
  2. Requirements Analysis
  3. Design
  4. Development and Coding
  5. Testing
  6. Maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

STRIDE

A
Spoofing Identity
Tampering with Date
Repudiation
Information Disclosure
Denial of Service
Elevation of Privileges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DREAD

A
Damage Potential
Reproducibility
Exploitability
Affected Users
Discoverability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Web Application Firewall

A

Appliance or plug-in that parses and filters HTTP traffic from a browser or client and applies a set of rules before the traffic is allows to proceed to the actual application server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

XML Appliances

A
  • used to specifically consume, manipulate, accelerate or secure XML transactions and transaction data.
  • used to broker communications between cloud services and enterprise applications.
  • XML firewall: used to validate XML traffic before it reaches the actual application
  • XML accelerator: designed to offload the processing of XML from the actual application and systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Federated Identity

A

Each organization maintains its on identity and verification systems that are unique and separate from the other organizations, and only contains their population of users and information.

Two main components
- Identity Provider (IdP): holds authentication mechanism for its users to prove their identity to the system

  • Relying Party (RP): take assertions provided by the IdP and uses it to make determinations whether to grant to a secure application and what type of access is granted.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SAML

A
  • XML based.
  • used to exchange information used in the authentication and authorization process between parties.

-used for information exchange between identity providers and service providers and it contains within the XML block the required information that each system needs or provides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OAuth

A

-authorization framework that enables a third-party application to obtain limited access to an HTTP services either on behalf of a resource owner by orchestrating an approval interaction between the resources owner and the HTTP service

17
Q

OpenID

A
  • authentication protocol based on the OAuth specification.
  • designed to provide developers with an easy and flexible mechanism to support authentication across organizations and utilize providers, alleviating the need to maintain their own password and stored system.
18
Q

WS-Federation

A
  • specification defines mechanisms to allow different security reals to federate.
  • authorized access to resources managed in one realm can be provided to security principals whose identities and attributes are managed in other realms.