Midterm Flashcards
Study the midterm (41 cards)
IAAA
Identification, Authentication, Authorization, Accountability
Identification
Username
Authentication
Authorization
granting permission
Accountability
tracking user activity
Multi Factor Authentication (MFA)
Password + OTP
Role-Based Access Control (RBAC)
Permissions based on job/user roles
Least Privilege Principle
Restricting application permissions so the user can only get necessary access
Which authentication method does a company use when employees need both a password and a one-time code sent to their mobile phones to log in?
Multi Factor Authentication (MFA)
Phising
Fake emails trick users into revealing credentials
Brute force attacks
Automated guessing of passwords
Session hijacking
Stealing an active session to bypass authentication
Privlage esculation
Gaining unauthorized admin access
Zero-day exploits
Attacks on unknown vulnrabilities
A hacker steals a session token from a user and gains access tot their banking website without knowing thwe password. What attack is this?
Session Hijacking
Secure coding practices
Write, Input, encoding, use
Write
Developers must write secure code to prevent cyberattacks
Input
input validation - prevents malicious input (ex. SQL injections, XSS)
Encoding
Output Encoding - stops cross-site scripting
Use
use of prepared statements - prevents SQL Injections
Which method is the best defense against SQL Injections
Using a prepared SQL Statement
Web Application Firewall (WAF)
Protects against web-based attacks/ Blocks malicous HTTP traffic
Aplication Sandboxing
Isolates Applications to prevent system-wide access.
Patch Management
regularly updating software to fix vulnerabilities