Domain 8 - Software Development Security Flashcards
out of IAAS (infrastructure as a service) PAAS (platform as a service) and SAAS (software as a service) which one requires the least amount of responsibility from the business owner and more responsibility from the cloud vendor
SAAS (software as a service) puts all the responsibility for security and maintenance on the cloud vendor. The business only provides their data
in cloud computing, what is a private cloud?
organizations build and run their own cloud infrastructure
in cloud computing what is a public cloud?
shared tenancy (Amazon AWS, Microsoft, Google, IBM) a company builds a massive infrastructure and rents or leases the products or services
in cloud computing, what is a hybrid cloud?
a mix of private and public
in cloud computing, what is Community cloud?
someone that has shared interest, maybe all the chief technical officers in banks in California. They may have a community cloud to discuss important topics, current issues and solutions they share.
out of IAAS (infrastructure as a service) PAAS (platform as a service) and SAAS (software as a service) which one requires the most amount of responsibility from the business owner and least responsibility required from the cloud vendor
IAAS (infrastructure as a service) requires the business/customer to own the most amount of responsibility. The customer is responsible for, OS, databases, security and applications.
what is the customer responsible with PAAS (platform as a service)
the customer is responsible for the application and that’s all. The cloud vendor is responsible for everything else
what do we want for programing – high or low cohesion
High
what do we want for programming – high or low coupling
low
~~~
in programming, cohesion and coupling what is the goal
1. high cohesion, high coupling
2. high cohesion, low coupling
3. low cohesion, low coupling
4. low cohesion, high coupling
- high cohesion, low coupling
maximize cohesion and minimize module dependencies (coupling)
change and configuration management steps (CCM)
- request control
- change control
- release control
change and configuration management - what happens in request control
- change is requested
- managers can conduct cost/benefit analysis
- developers can prioritize tasks
SDLC is part of a larger process known was SLC - what are the two additional phases after implementing SDLC
- Operations and maintenance support(post installation) - monitor for weakness, bacup, restore, methods are implemented. periodic risk analysis
- ** Revisions and system replacment** - changes to SLC follow change management
what is the primary way to prevent cross site scripting vulnerability
- input validation
- 2 types of this attack
— stored (persistant)
— reflected (most common) - all flavors targe the victims browser*
what is the major way to prevent SQL injection
- input validation
- programs should never allow SQL code to be passed directly from a user to the database
what is IDE in software developing
Integrated Development environment
cross site request forger attack
- target a web application
- accomplished by tricking a valid and authenticated user into sending some commands to web applications that trusts the user
- the web application executes these command from an attacker that it should not be executing
concentric circle security is what
- defense in depth or
- layered security
What are some Application-Level Attacks
- overflow, active content, cross-site script, denial of service, SQL injection, session hijacking , phishing.
polyinstantiation
- allows different versions of the same information to exist at different classification levels
- can be used to prevent unauthorized inference by creating different objects of the same name simultaneously
Operating system Attacks
- attackers always try to search for operating system vulnerabilities, like buffer overflow , OS bugs, unpatched operating system.
Misconfiguration Attacks
- target poorly configured service or device, or one left in default configuration (like WiFi router left in default settings)
buffer overflow ways to prevent
- code should be written to perform parameter or bounds checking
—never allow a chunk of data written to the buffer that is larger than the buffer -
Adress space layout randomization (ASLR)
—guards against buffer overflow by randomizing the location where system executibles are loaded into memory
Shrink Wrap Code Attacks
- an act of exploiting holes in unpatched or poorly configured software you buy and install. Often also often contain sample scripts/code.