Input Threats & Validation Flashcards

1
Q

What is a primary attack method

A

Inputting data - trust nothing that is inputted, data may be unknown, untrusted, insecure or malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are injection attacks

A

Putting data into a web app - malicious code within an input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SQL Injection

A

Insertion or injection of an SQL query into the input data provided by a user to an application. It can read/modify data in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Out of bound read

A

Can access data out of the range of the buffer, means other maybe sensitive information can be affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Out of bounds write

A

Can modify data out of the range of the buffer
Buffer overflow occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Buffer overflow

A

Happens in out of bounds write
When a programmer attempted to put more data in a buffer than it can hold or when a program attempts to put data in a memory area past a buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whitelist(input validation)

A

Write what data is allowed, everything else is denied by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blacklist(input validation)

A

write what data isn’t allowed, everything else is accepted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to implement input validation?

A

Pattern matching, regular expressions, custom validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can we ensure data input into a web form by a user is of the correct type

A

built-in data fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly