Hardware, Threats & Collaboration Flashcards
(5 cards)
File System & Hardware Vulnerabilities
File System Example: World-writable files → privilege escalation
Prevention: Set proper file permissions
Hardware Example: Unpatched firmware → attacker gets root
Prevention: Regularly update firmware and drivers
Side-Channel Attacks
Attack based on physical signals (timing, power use)
Types:
Timing attack
Power analysis
Mitigation: Constant-time algorithms, limit data leakage
Collaboration in Secure Dev
Benefits:
Shared knowledge
Faster detection of flaws
Better decision-making
Example: Dev + Security team find a flaw during sprint planning
Code Reviews for Secure Coding
Focus Areas:
Authentication & access control
Input validation
Sensitive data handling
Error handling
Example: PR review catches password stored in plain text
SAST vs DAST
SAST: Static scan of code → finds issues early (e.g., GitHub scan)
DAST: Scans running app → finds runtime flaws (e.g., OWASP Zap)
Why Use Both: Covers more attack surfaces