Final Study Deck Flashcards

(74 cards)

1
Q

The practices, policies, and technologies implemented to protect a
computer network and the data transmitted over it from unauthorized access, misuse, modification, or denial of service.

A

Network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

encompasses various measures designed to ensure the confidentiality, integrity, and availability
of network resources and information.

A

Network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network ________ is a security device or software application that monitors and controls
incoming and outgoing network traffic based on predetermined security rules.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Its primary function is to establish a barrier between a trusted internal network and untrusted
external networks, such as the internet, to prevent unauthorized access and protect against various
cyber threats.

A

a
firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An ________ is a security mechanism designed to monitor network
traffic, system activities, and events for signs of unauthorized or malicious behavior.

A

IDS (Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

operates by analyzing network packets, system logs, and other data sources to detect known attack signatures, abnormal patterns, or suspicious activities that may indicate a security incident.

A

IDS (Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a/n ________ identifies potential threats or anomalies, it generates alerts or notifications to prompt further investigation by security personnel.

A

IDS (Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An __________ is a proactive security solution that not only detects
but also actively blocks or prevents malicious activities and attacks in real-time.

A

IPS (Intrusion Prevention System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It operates similarly to an IDS by analyzing network traffic and system events for signs of threats. However, in addition to generating alerts, a/n __________ can take immediate action to block malicious traffic, quarantine compromised hosts, or apply access control policies to prevent further damage.

A

IPS (Intrusion Prevention System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ______________ is a technology that creates a secure and encrypted connection over a less secure network, such as the internet.

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Allows users to securely access private networks and resources from remote locations as if they were directly connected to the network’s local area.

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network __________ is the process of dividing a computer network into smaller, isolated segments or subnetworks to enhance security, performance, and manageability.

A

segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Instead of having a single, flat network where all devices communicate freely with each other, _________ creates boundaries or zones within the network, limiting the scope of communication and access between different segments.

A

segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Each ________ in the process known as __________ typically represents a logical grouping of devices based on factors such as
function, location, or security requirements.

A

segment/segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ______________ attack is a malicious attempt to disrupt the normal functioning of a targeted system, network, or service by overwhelming it with a flood of illegitimate traffic or requests.

A

Denial-of-Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The primary goal of a _________attack is to render the targeted resource unavailable to legitimate users, causing downtime, service degradation, or complete unavailability.

A

Denial-of-Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Distributed Denial-of-Service (DDoS) attacks are a variant of DoS attacks where multiple compromised computers, known as ________ are coordinated to launch simultaneous attacks
against a single target.

A

Botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This attack consist of devices infected with malware that enables the attacker to remotely control them and use them to generate and send malicious traffic to the target.

A

Distributed Denial-of-Service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

harnesses the combined resources of numerous compromised devices, to produce large volumes of traffic and inflict significant damage to a network/target

A

Distributed Denial-of-Service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

refers to vulnerabilities in the client-side components of a web application that can be exploited by attackers to compromise the security of the application.

A

CLIENT-SIDE SECURITY CONTROL FAILURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Intercept and modify HTTP/S requests and responses between a web browser and the target application. This feature is useful for inspecting and modifying web traffic to identify vulnerabilities. (BurpSuite)

A

WEB APPLICATION PROXY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A _______ is a period of interaction between a user and an application, typically starting when a user logs in and ending when they log out or their session expires due to inactivity.

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

____________ in application security refers to the process of securely managing user sessions within a web application.

A

Session Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A small piece of data sent from a website and stored on a user’s device by the web browser while the user is browsing

A

Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Cookies are sent from a website and stored in the user's ___________. When the user revisits the same website, the browser sends the cookie back to the website, allowing the site to recognize the user and retrieve their preferences or session information.
Web Browser
26
________ are typically used to remember information about the user, such as their preferences or login session status, which can enhance the browsing experience or streamline the user's interactions with the website.
Cookies
27
Three types of session managment threats
Hijacking, Fixation, and replay attack
28
Session ________: When a user logs into the application, a unique session identifier is created for that user. This identifier is used to associate subsequent requests from the user with their session.
Creation
29
Session _________: The session identifier is included in each request sent by the user to the application, typically through cookies or URL parameters. This allows the application to identify and associate requests with the correct session.
Tracking
30
Session __________: Sessions should have a timeout period after which they expire due to user inactivity. This helps prevent unauthorized access to the application if a user forgets to log out or leaves their session unattended.
Timeout
31
Session ________ : Users should have the ability to manually log out of their session, which invalidates their session identifier and prevents further access to the application until they log in again.
Revocation
32
Session ___________: Session identifiers and other sensitive session data should be encrypted to prevent eavesdropping and tampering by attackers.
Encryption
33
Session ______________: Techniques should be implemented to prevent session fixation attacks, where an attacker tricks a user into using a known session identifier, allowing the attacker to hijack the user's session.
Fixation Prevention
34
Session __________: Measures should be taken to ensure the integrity of session data, such as using message authentication codes (MACs) to detect tampering.
Integrity
35
_________________ is a type of security vulnerability in web applications. It occurs when an attacker is able to inject malicious scripts, typically in the form of JavaScript, into web pages viewed by other users.
Cross-Site Scripting (XSS)
36
These are all attacks common in what? ... * Stealing sensitive information from the victim's browser, such as cookies, session tokens, or other credentials. * Modifying the appearance or behavior of the web page to deceive users or perform unauthorized actions on their behalf. * Redirecting users to malicious websites or phishing pages. * Performing actions on the application on behalf of the victim, such as making unauthorized transactions or changing account settings.
Cross-Site Scripting (XSS)
37
__________ vulnerabilities typically arise when web applications fail to properly validate and sanitize user input before displaying it in web pages.
Cross-Site Scripting (XSS)
38
Preventing XSS vulnerabilities requires
proper input validation and output encoding
39
In a ______ attack, an attacker tricks a user into unknowingly submitting a malicious request to a web application that the user is authenticated with.
CROSS SITE REQUEST FORGERY
40
CROSS SITE REQUEST FORGERY Step 1
The user is authenticated to a web application, such as by logging in and obtaining a session cookie.
41
CROSS SITE REQUEST FORGERY Step 2
The attacker creates a malicious webpage or email containing a crafted HTML form or script. This form or script is designed to perform a specific action on the targeted web application, such as changing the user's email address or transferring funds from their account.
42
CROSS SITE REQUEST FORGERY Step 4
Because the victim is already authenticated to the targeted web application, their browser automatically includes the necessary authentication credentials (e.g., session cookie) in the request initiated by the malicious form or script.
43
CROSS SITE REQUEST FORGERY Step 3
The attacker lures the victim into visiting their malicious webpage or clicking on a link in a phishing email. When the victim's browser loads the malicious page, it automatically submits the crafted form or executes the malicious script.
44
CROSS SITE REQUEST FORGERY Step 5
The targeted web application receives the malicious request and processes it as if it were a legitimate request initiated by the user. This can result in unauthorized actions being performed on behalf of the victim, such as changing account settings, making transactions, or revealing sensitive information.
45
__________ are settings that can be applied to HTTP/S cookies to control their behavior and usage
Cookie Flags
46
__________ provide additional security measures and help enforce certain rules regarding how cookies are handled by web browsers.
Cookie Flags
47
COOKIE FLAGS _________: When this flag is set, the cookie will only be sent over HTTPS connections, ensuring that it is transmitted securely between the client (browser) and the server. This helps prevent the cookie from being intercepted by unauthorized parties
Secure
48
COOKIE FLAGS _________: When this flag is set, the cookie is inaccessible to JavaScript running on the page. This prevents certain types of attacks, such as cross-site scripting (XSS), where an attacker may try to steal the cookie using malicious scripts injected into the page.
HttpOnly
49
COOKIE FLAGS __________: This flag allows a server to declare whether a cookie should be restricted to a first-party or same-site context. It helps mitigate cross-site request forgery (CSRF) attacks by ensuring that cookies are only sent along with requests initiated from the same site.
SameSite
50
COOKIE FLAGS ________: Specifies the domain for which the cookie is valid. By default, a cookie is only valid for the domain that set it, but you can set this flag to make it valid for a wider range of subdomains.
Domain
51
COOKIE FLAGS _______: Specifies the URL path for which the cookie is valid. By default, a cookie is valid for the path that set it, but you can restrict it to a specific directory or URL path using this flag.
Path
52
COOKIE FLAGS ______________: Specifies the expiration time for the cookie. You can set either an expiration date or a duration (in seconds) after which the cookie will expire
Expires/Max-Age
53
___________ is a type of software vulnerability that occurs when a program writes more data to a buffer (a fixed-size storage space) than it was allocated to hold. - Commonly exploited by attackers to execute malicious code, escalate privileges, or crash a system.
Buffer overflow
54
SECURE CODE PRACTICES __________: Always validate and sanitize input from users and other sources to prevent injection attacks such as SQL injection, cross-site scripting (XSS), and command injection.
Input Validation
55
SECURE CODE PRACTICES ______________: Encode output to protect against XSS attacks. Encode data appropriately based on the context in which it will be displayed (e.g., HTML, URL, JavaScript).
Output Encoding
56
SECURE CODE PRACTICES _________________: Implement strong authentication mechanisms to verify the identity of users, and enforce proper authorization checks to ensure that users have access only to the resources they are allowed to.
Authentication and Authorization
57
SECURE CODE PRACTICES _______________: Use secure session management techniques, such as generating unique session identifiers, enforcing session timeouts, and securely transmitting session data.
Session Management
58
SECURE CODE PRACTICES ______________: Always use secure communication protocols (e.g., HTTPS) to protect sensitive data transmitted over networks. Avoid transmitting sensitive information in URLs or using insecure protocols like HTTP.
Secure Communication
59
SECURE CODE PRACTICES _______________: Implement proper error handling to prevent information leakage and provide minimal information to attackers in case of errors. Avoid exposing stack traces or detailed error messages to users.
Error Handling
60
SECURE CODE PRACTICES ________________: Configure software components, frameworks, and servers securely, following best practices and guidelines provided by the respective vendors.
Secure Configuration
61
SECURE CODE PRACTICES __________________: Implement proper error handling to prevent information leakage and provide minimal information to attackers in case of errors. Avoid exposing stack traces or detailed error messages to users.
Error Handling
62
SECURE CODE PRACTICES ___________________: Configure software components, frameworks, and servers securely, following best practices and guidelines provided by the respective vendors.
Secure Configuration
63
SECURE CODE PRACTICES ________________: Encrypt sensitive data at rest and in transit. Use strong cryptographic algorithms and key management practices to protect data confidentiality and integrity.
Data Protection
64
SECURE CODE PRACTICES _______________: Follow the principle of least privilege, granting users and processes only the minimum permissions required to perform their tasks. Limit access to sensitive resources and functionalities.
Least Privilege
65
SECURE CODE PRACTICES _____________________: Keep software dependencies, libraries, and frameworks up to date with the latest security patches to mitigate known vulnerabilities.
Regular Updates and Patching
66
SECURE CODE PRACTICES _______________: Perform regular security assessments, code reviews, and penetration testing to identify and remediate security vulnerabilities early in the development lifecycle.
Security Testing
67
SECURE CODE PRACTICES __________________: Educate developers, testers, and other stakeholders about secure coding practices, common security risks, and emerging threats to foster a security-conscious culture within the organization.
Security Education and Awareness
68
SECURE DEVELOPMENT LIFECYCLE 1. _________________: Security considerations are identified and integrated into the initial planning and requirement gathering phase. This involves understanding potential threats, regulatory requirements, and security goals of the project.
Planning and Requirements
68
The _________________ is a systematic approach to integrating security practices and considerations into every phase of software development. - Its primary goal is to produce software that is inherently more secure, resilient to attacks, and less prone to vulnerabilities.
Secure Development Lifecycle (SDL)
69
SECURE DEVELOPMENT LIFECYCLE 2. __________: During the design phase, security architecture is defined. This includes specifying security controls, encryption methods, authentication mechanisms, and other security-related design decisions.
Design
70
SECURE DEVELOPMENT LIFECYCLE 3. _______________: Security principles are applied during the coding phase. Developers follow secure coding practices, use secure libraries and frameworks, and perform security code reviews to identify and fix vulnerabilities early in the development process.
Implementation
71
SECURE DEVELOPMENT LIFECYCLE 5. ___________: Secure deployment practices are followed to ensure that the software is deployed in a secure environment. This includes securely configuring servers, encrypting data in transit and at rest, and implementing proper access controls.
Deployment
71
SECURE DEVELOPMENT LIFECYCLE 4. _____________: Various types of testing are conducted to ensure the security of the software. This includes: - Static Analysis: Tools analyze the source code for security vulnerabilities without executing the program. - Dynamic Analysis: The software is tested while running to identify security vulnerabilities such as input validation errors and authentication issues. - Penetration Testing: Ethical hackers attempt to exploit the software to uncover vulnerabilities that may not be apparent through automated testing.
Testing
72
SECURE DEVELOPMENT LIFECYCLE 6. _____________: The software is regularly monitored for security vulnerabilities, and patches and updates are applied promptly to address any discovered vulnerabilities. Additionally, ongoing security assessments and audits are conducted to ensure the continued security of the software.
Maintenance and Updates