Eigen vragen Flashcards

1
Q

What are ways to handling risks

A
  • Ignore
  • Avoid
  • Mitigate
  • Accept
  • Transfer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Risk appetite

A

Risicobereidheid is het risiconiveau dat een organisatie bereid is te aanvaarden bij het nastreven van haar doelstellingen, en voordat wordt bepaald dat actie moet worden ondernomen om het risico te beperken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Noem een paar Best practises

A

Owasp

ITIL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Noem de 2 approach

A

Reactive: How to crash a computer, hacker

Proactive approach: Create a secure systems. mitigate threats upfron. secure design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SQL Injection

A

Een SQL-injectie is een soort cyberaanval waarbij een hacker een SQL-codefragment (Structured Query Language) gebruikt om een database te manipuleren en om toegang te verkrijgen tot mogelijk waardevolle informatie.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

XXE

A

• An XML External Entity attack is a type of attack against an
application that parses XML input.
• This attack occurs when XML input containing a reference to an
external entity is processed by a weakly configured XML parser.
• Mitigation:
• The XML processor should be configured to use a local static DTD
and disallow any declared DTD included in the XML document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CSRF

A

In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end user’s account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is Non-repudiation

A

Onweerlegbaarheid. Iets is gebeurt en dit is niet te weerleggen. Je tekent met je private key jou digital singnature die met een public key wordt ge decrypt om er zeker van te zijn dat dit bericht niet veranderd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Noem de random modules

A

os.urandom
/dev/urandom
XOR relies on randomness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Eigenschappen symmetric

A

Same key to encode / decode.
• Key exchange problem:When these keys are shared over an unsecured connection, they are vulnerable to being intercepted by malicious third parties

  • Block-based or Stream-based
  • Relatively Fast (disk-encryption)
  • Modes: to encrypt large plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eigenschappen assymetric

A
  • Different key to encode / decode.
    • Public key can be published
    • Limited code-space
    • Relatively Slow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Noem de guidelines

A

How to program
How to review
how to test
how to deploy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Redenen voor zwakheden in code

A
  • Gebruik maken van shortcuts
  • Gebrek aan kennis
  • Focus op resultaat ipv kwaliteit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wat is test as specification

A
  • Test define behavior

* Create test together with specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is regression Test

A

Regression Testing is defined as a type of software testing to confirm that a recent program or code change has not adversely affected existing features. To not allow new features to break the current software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Noem examples of Hardening

A

Removal of maintenance hooks
Removal of debugging code and flags in code.
Removal of dead code / unused code
Removal of comments

17
Q

Noem voorbeelden van Defence in dept(DiD)

A

Access rights
Elevated accounts
Account per application (or sub-application)
Separate read-only for modifiable data (static / dynamic)
Restrict use of resources
Be aware of command-escapes in the program.
Restrict Sudo

18
Q

Hoe kun je een programma monitoren

A
Check program against signature
           - Read-only
Check running processed
           - Unexpected processed / Missing processes
Check network ports and connections
            - Unexpected listens
             - Unexpected src/dst ip's 
              - Unexpected ports
Check filesystem
             - Unexpected files in directories
Check logfiles
              - Unexpected error, Exceptional cases
19
Q

Noem de controls(Les4)

A
Detective controls
Preventive controls
Deterrent controls
Corrective controls
Compensating controls