FINAL EXAM Flashcards

(64 cards)

1
Q

What is a common pattern observed in Business Logic Vulnerabilities (BLVs)?

A

Exploiting functionality not originally designed to be secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three architectural mitigations for Business Logic Vulnerabilities (BLVs).

A

• Use worst-case scenario planning during design phases
• Collaborate with stakeholders to anticipate abusive user behavior
• Avoid assumptions about user intent or benign interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can statistical modeling and monitoring help detect Business Logic Vulnerabilities (BLVs)?

A

• Collect and analyze user interaction data
• Model user inputs and expected outcomes to detect anomalies
• Use behavior analytics to flag deviations from standard use cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Prototype Pollution as a client-side attack.

A

__PROTO__ can be altered, to override built-in functions, often used to escalate privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Clickjacking and how is it typically achieved?

A

Clickjacking involves tricking users into clicking hidden or disguised UI elements. This is often done via iframes and CSS opacity manipulation, such as using a malicious overlay that submits a hidden form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary security risk associated with accepting user input into a website?

A

cross-site scripting (XSS) and SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some general guidelines and practices for handling user input securely?

A

• Do not rely solely on client-side validation
• Ensure server-side validation
• Use whitelisting and blacklisting
• Assume all input is malicious
• Sanitize your input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an RFC (Request for Comments)?

A

Document that describes acceptable syntax for various inputs like email addresses, URLs, and XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the key technologies and systems commonly used to build a functional website.

A

HTML, CGI scripts, JavaScript, and a SQL database back-end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a major security concern with HTML, and how can it be exploited by malicious users?

A

HTML was not created with security in mind. Malicious users can insert their own <form> tags to create fake forms to steal data or run malicious scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you help prevent attacks leveraging HTML vulnerabilities?

A

• Monitor discussion groups to identify untrustworthy data input
• Ensure input is validated
• Check HTML code periodically for malicious code
• Verify the size of the file, as a change in size can indicate a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of Common Gateway Interface (CGI), and how can it be secured?

A

CGI defines how a web server interacts with databases/documents/programs. To secure it:
• Program CGI with security in mind
• Research known vulnerabilities
• Review programs and patch as needed
• Validate and sanitize user input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

While JavaScript can execute arbitrary code when a page loads, what are some built-in security features it provides regarding the client computer’s file system?

A

JavaScript cannot write/delete files or directories on a client computer. There is no file object or file access function for JavaScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What types of attacks are common against a SQL database back-end, and what is a common mitigation approach?

A

Common attacks: SQL injection, brute-force attacks. Mitigations: access control, encryption, role-based authentication, integrity verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between the Software Development Life Cycle (SDLC) and the Secure Software Development Life Cycle (SSDLC)?

A

SDLC focuses on functionality and performance; SSDLC includes security at every phase of development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name some key security considerations to incorporate during the ‘Systems analysis’ and ‘Designing’ stages of the SDLC.

A

Systems analysis: identify potential threats (e.g., injection, overflow)
Designing: establish a secure foundation with threat assessment and mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are key security practices developers should incorporate during the ‘Implementation’ stage of the SDLC?

A

Input validation, strong encryption, secure data handling, authentication, error handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What types of security testing are performed during the ‘Testing’ stage of the SDLC?

A

Testing for privilege, injection, error handling, directory traversal, and penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why is HTTPS preferred over HTTP for sensitive web communications?

A

HTTPS uses SSL/TLS to encrypt and authenticate communications, protecting against interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In the context of SSL/TLS, what is the purpose of hashing algorithms? Name two significant hashing algorithms mentioned.

A

Hashing ensures data integrity. Examples: SHA1, MD5 (MD5 has known vulnerabilities)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is access control in web applications, and what criteria can it be based on?

A

Access control regulates user access based on factors like IP, time of day, or browser; uses authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Name some causes of information disclosure in web applications.

A

Hardcoded API keys, visible internal content, insecure configs, design flaws causing error messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How can the impact of information disclosure be assessed, and what is more important to focus on?

A

Focus on how leaked data can be used; assess risk by potential impact, not just presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Name four methods to prevent information disclosure.

A
  • Review third-party tools
  • Awareness training
  • Generic error messages
  • Secure configurations
  • QA code audits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the main purpose of general data privacy laws for websites?
To regulate how personal data is collected, stored, and used, and define compliance responsibilities
26
According to GDPR, what are some key rights users must have regarding their personal data collected by a website?
• Consent and retraction • Access to data • Breach notification within 72 hours
27
Name three 'lawful basis' reasons defined by GDPR for collecting, processing, or storing a user's personal information.
Consent, Legal obligation, Legitimate interest
28
What information must a website's privacy policy provide according to the California Privacy Rights Act (CPRA)?
• Data collected • Who has access • Access/modify rights • DNT requests • Policy updates and revision history
29
What is required regarding terms and conditions for e-commerce websites?
Must formalize interaction between user and site, become binding once notified, outline mutual rights
30
What is the Payment Card Industry Data Security Standard (PCI DSS)? Is it a law?
A security standard for cardholder data. Not a law but required for merchants to process cards
31
What is Strong Customer Authentication (SCA), required by PSD2 for transactions in the European Economic Area (EEA)?
Requires two-factor authentication for online payments to enhance security and reduce fraud
32
Name three common types of malware mentioned in the sources.
Viruses, Worms, Trojans, Rootkits, Spyware, Ransomware
33
What are some technical methods for preventing email attacks?
Email tracking, filtering, disclaimers, blocking, message archiving
34
Name three best practices for mitigating online risks and threats when connecting to the internet.
Update systems, use antivirus, encrypt data
35
What are the three main areas often targeted by hackers looking for web application vulnerabilities?
Authentication, Input validation, Session management
36
According to the CERT top 10 tips for secure coding, what is a key principle regarding default access?
Deny access by default
37
What principle should be used when designing or writing with JavaScript to provide a secure environment for executing mobile code?
Prefer to have obviously no flaws than no obvious flaws
38
What is Software Configuration Management (SCM), and what are some of its advantages?
SCM tracks software changes. Advantages: prevent unauthorized changes, control, quality assurance
39
Name three threats listed in the OWASP Top 10 Threats.
Broken access control, Injection, Security misconfiguration (others include cryptographic failure, SSRF)
40
What is the mitigation strategy for Broken Access Control vulnerabilities according to OWASP?
Principle of least privilege
41
What OWASP Top 10 threat is also known as sensitive data exposure, and what is a key mitigation strategy?
Cryptographic failures. Mitigation: encrypt sensitive data, use secure protocols, avoid outdated crypto
42
What type of attack is a common example of an Injection flaw, and what is its mitigation?
SQL Injection. Mitigation: least privilege and input validation
43
How can security misconfigurations lead to vulnerabilities, and what are some mitigations?
Admins may misuse defaults or misconfigure systems. Mitigations: audits, product training, lifecycle reviews
44
What are some indicators of vulnerable and outdated components, and how can this threat be mitigated?
Missing patches, unmanaged software. Mitigation: inventory, patching, CVE tracking
45
What are some common causes for Security Logging and Monitoring failures?
Missing logs, no central log system, no alerts, failure to escalate issues
46
What is Server-Side Request Forgery (SSRF), and what is a key mitigation strategy?
SSRF tricks server to fetch internal URLs. Mitigation: deny by default, firewall rules, validate input
47
What is the first step in performing a website vulnerability and security assessment (discovery activity)?
Identify components and perform fingerprinting/enumeration
48
What information is typically sought during the initial discovery (fingerprinting/enumeration) phase of a website assessment?
IP addresses, running services, OS types, known vulnerabilities
49
What is a Ping Sweep, and what are some utilities used for it?
Ping across IP ranges to find live hosts. Tools: Nmap, Hping, SuperScan
50
When assessing the web server OS, besides identifying the OS type and version, what are some other important items to look for?
Service packs, active services, remote access (Telnet, SSH), known vulnerabilities
51
What types of tools are recommended for assessing web server applications, and what are they used to look for?
Nessus, Metasploit, AppScan. Look for code issues, injection, bypassing auth
52
When assessing the website front-end, what utility can be used to crawl pages for hidden fields and directory structures?
HTTrack Website Copier
53
What are planned attacks (also called penetration testing or pen testing) used for in a website assessment?
Identify vulnerabilities through controlled simulated attacks
54
In penetration testing, what is privilege escalation? Name the two types mentioned.
Exploiting flaws to gain access. Types: vertical (admin), horizontal (peer access)
55
What is SQL injection, and how can an attacker attempt it manually?
Inject SQL commands in forms or URLs to manipulate DBs. Example: '; exec...
56
What is the general structure for a website vulnerability and security assessment report?
Executive summary, Findings, Assessment details, Recommended remediations
57
In the Executive Summary of a vulnerability assessment report, what type of findings should be focused on?
Critical/high vulnerabilities and compliance-affecting issues
58
Name three types of testing strategies mentioned for websites and web applications.
First Impressions, Functional Testing, Security Testing, Mobile Testing
59
How can you test the security of a website, particularly regarding personal data?
Enter user data, verify encryption and security, include testing in all dev phases
60
What are the four steps to take when mitigating a vulnerability or other security flaw?
Verify, Analyze/Prioritize, Mitigate, Retest
61
What are some specific tests for websites designed for mobile devices?
OS compatibility, load time, button size, image sizing, dial-out functions
62
What are some essential pre-launch tasks before releasing a website?
Review content/media, test compatibility, check licensing, begin marketing
63
What is the purpose of website diagnostics immediately before launching?
Find static issues like broken links, unreachable elements, code errors
64
What is XSS (Cross-Site Scripting), and what are key mitigation practices?
XSS allows script injection. Mitigation: sanitize input, encode output, follow best practices