OWASP Flashcards

(50 cards)

1
Q

What is the role of a cybersecurity analyst?

A

To help keep data safe and reduce risk for an organization using security frameworks, controls, and principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is OWASP?

A

Open Worldwide Application Security Project, a foundation that promotes secure software development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does OWASP stand for?

A

Open Worldwide Application Security Project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are security principles?

A

Guidelines embedded in daily tasks of cybersecurity to protect systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the ‘Minimize attack surface area’ principle?

A

Reducing all potential vulnerabilities a threat actor could exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is meant by ‘attack surface’?

A

All the potential vulnerabilities a threat actor could exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the ‘Principle of least privilege’?

A

Users are given the least amount of access necessary to perform their tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is ‘Principle of least privilege’ important?

A

It limits access to reduce potential damage from breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ‘Defense in depth’?

A

Using multiple, varied security controls to mitigate risks and threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does ‘Separation of duties’ mean?

A

Critical actions are performed by multiple people, each with limited privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is ‘Separation of duties’ used?

A

To prevent abuse of power and reduce insider threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does ‘Keep security simple’ mean?

A

Avoiding unnecessary complexity in security solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why should security be kept simple?

A

Complexity makes security difficult and error-prone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is ‘Fix security issues correctly’?

A

Identify root cause, contain impact, and verify the remediation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are additional OWASP principles?

A

Establish secure defaults, Fail securely, Don’t trust services, Avoid security by obscurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does ‘Establish secure defaults’ mean?

A

Applications should default to the most secure settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why use secure defaults?

A

So users are protected without needing to configure settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is ‘Fail securely’?

A

When a control fails, it should default to its most secure state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Example of ‘Fail securely’?

A

A firewall fails by closing all connections and blocking new ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does ‘Don’t trust services’ mean?

A

Organizations shouldn’t trust third-party services by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why shouldn’t organizations trust services?

A

Third parties may have different security policies.

22
Q

Example of ‘Don’t trust services’?

A

An airline verifying vendor data before sharing it with customers.

23
Q

What is ‘Avoid security by obscurity’?

A

Security should not rely solely on keeping system details hidden.

24
Q

Why avoid ‘security by obscurity’?

A

True security requires layered defenses beyond secrecy.

25
Example of 'security by obscurity' failing?
Relying on hidden source code instead of solid policies and controls.
26
What should real application security include?
Password policies, defense in depth, network architecture, and audit controls.
27
How do analysts apply security principles?
By integrating them into development and operational practices.
28
What does OWASP promote?
Secure coding, development, and deployment practices.
29
How can entry-level analysts use OWASP principles?
To reduce risks and promote safe development.
30
What is a SIEM dashboard?
A tool used to monitor security information and events.
31
What is a vulnerability scanner?
A tool used to find security weaknesses in systems.
32
Why is analyzing logs important?
To detect and understand potential security incidents.
33
What is remediation in cybersecurity?
Fixing the root cause of a security issue and confirming it's resolved.
34
What is the main goal of security principles?
To protect systems, data, and people from threats.
35
What does 'contain the impact' mean?
Limit the damage caused by a security incident.
36
What is the role of testing after fixing a security issue?
To ensure that the remediation is successful.
37
Why is using varied security controls important?
To provide defense in depth and handle different types of threats.
38
Why should critical actions involve multiple people?
To reduce the risk of error or abuse.
39
What is a default secure state?
A setting where the most secure option is active by default.
40
What is a firewall?
A security device that controls incoming and outgoing network traffic.
41
Why is failing securely better?
It prevents systems from becoming vulnerable during failure.
42
Why validate third-party services?
To ensure they meet your organization’s security standards.
43
How do you monitor security events?
By using tools like SIEM dashboards.
44
What is the impact of complexity on security?
It can introduce more vulnerabilities and errors.
45
Why are root cause analyses important?
They help prevent similar future incidents.
46
How can complexity hinder security fixes?
It can make issues harder to identify and resolve.
47
What is a key takeaway for entry-level analysts?
Security principles are foundational in protecting organizations.
48
What should not be the basis of application security?
Hiding the source code alone.
49
What supports real security besides code secrecy?
Password rules, layered defense, and network safeguards.
50
Why is OWASP important for new analysts?
It offers practical guidance for securing systems.