Hardware, Threats & Collaboration Flashcards

(5 cards)

1
Q

File System & Hardware Vulnerabilities

A

File System Example: World-writable files → privilege escalation
Prevention: Set proper file permissions
Hardware Example: Unpatched firmware → attacker gets root
Prevention: Regularly update firmware and drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Side-Channel Attacks

A

Attack based on physical signals (timing, power use)
Types:
Timing attack
Power analysis
Mitigation: Constant-time algorithms, limit data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collaboration in Secure Dev

A

Benefits:
Shared knowledge
Faster detection of flaws
Better decision-making
Example: Dev + Security team find a flaw during sprint planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Code Reviews for Secure Coding

A

Focus Areas:
Authentication & access control
Input validation
Sensitive data handling
Error handling
Example: PR review catches password stored in plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SAST vs DAST

A

SAST: Static scan of code → finds issues early (e.g., GitHub scan)
DAST: Scans running app → finds runtime flaws (e.g., OWASP Zap)
Why Use Both: Covers more attack surfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly