Security+ 4 Flashcards

1
Q

V-shaped model, which stresses more testing, or rapid application development (RAD), which puts more emphasis on process and less emphasis on planning. Then there is the agile model, which breaks work into small increments and is designed to be more adaptive to change. The agile model has become more and more popular since 2001. It focuses on customer satisfaction, cooperation between developers and business people, face-to-face conversation, simplicity, and quick adjustments to change.

A

V-Shaped Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DevOps emphasizes the collaboration of those two departments so that the coding, testing, and releasing of software can happen more efficiently—and hopefully, more securely. DevOps is similar to continuous delivery— which focuses on automation and quick execution—but from an organizational standpoint is broader and supports greater collaboration. A secure DevOps environment should include the following concepts: secure provisioning and deprovisioning of software, services, and infrastructure; security automation; continuous integration; baselining; infrastructure as code; and immutable systems. Immutable means unchanging over time. From a systems and infrastructure viewpoint it means that software and services are replaced instead of being changed. Rapid, efficient deployment of new applications is at the core of DevOps and it is one of the main tasks of all groups involved.

A

DevOps …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Minimize the attack surface area: Every additional feature that a programmer adds to an application increases the size of the attack surface and increases risk. Unnecessary functions should be removed, and necessary functions should require authorization.

Establish secure defaults: Out-of-the-box offerings should be as secure as possible. If possible, user password complexity and password aging default policies should be configured by the programmer, not the user. Permissions should default to no access and should be granted only as they are needed.

Provide for authenticity and integrity: For example, when deploying applications and scripts, use code signing in the form of a cryptographic hash with verifiable checksum for validation. A digital signature will verify the author and/or the version of the code—that is, if the corresponding private key is secured properly.

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fail Securely for programming : error handling/exception handling code should be checked so malicious users cant find out extra info about system.

code checking, which involves limiting the reuse of code to that which has been approved for use, and removing dead code.

A

Code Info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A runtime error is a program error that occurs while the program is running. The term is often used in contrast to other types of program errors, such as syntax errors and compile-time errors. Runtime errors might include running out of memory, invalid memory address access, invalid parameter value, or buffer overflows/dereferencing a null pointer (to name a few), all of which can only be discovered by running the program as a user. Another potential runtime error can occur if there is an attempt to divide by zero.

Compile-time errors might include syntax errors in the code and type-checking errors. A programmer can check these without actually “running” the program, and instead checks it in the compile stage when it is converted into machine code.

A

Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Static code analysis is a type of debugging that is carried out by examining the code without executing the program.

Fuzz Testing = where random data is inputted into a computer program in an attempt to find vulnerabilities. The program to be tested is run, has data inputted to it, and is monitored for exceptions such as crashes. Once the fuzz test is complete, the results are analyzed, the code is reviewed and made stronger, and vulnerabilities that were found are removed.

integer overflows are when arithmetic operations attempt to create a numeric value that is too big for the available memory space.

A

Code info #2 etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A memory leak is a type of resource leak caused when a program does not release memory properly. The lack of freed-up memory can reduce the performance of a computer, especially in systems with shared memory or limited memory. A kernel-level leak can lead to serious system stability issues. The memory leak might happen on its own due to poor programming, or it could be that code resides in the application that is vulnerable, and is later exploited by an attacker who sends specific packets to the system over the network.

A null pointer dereference occurs when the program dereferences a pointer that it expects to be valid, but is null, which can cause the application to exit, or the system to crash.

A

Memory Leak Etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A programmer may make use of address space layout randomization (ASLR) to help prevent the exploitation of memory corruption vulnerabilities. It randomly arranges the different address spaces used by a program (or process). This can aid in protecting mobile devices (and other systems) from exploits caused by memory-management problems. While there are exploits to ASLR (such as side-channel attacks) that can bypass it and de-randomize how the address space is arranged, many systems employ some version of ASLR.

A

ASLR …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Arbitrary code execution is when an attacker obtains control of a target computer through some sort of vulnerability, thus gaining the power to execute commands on that remote computer at will. Programs that are designed to exploit software bugs or other vulnerabilities are often called arbitrary code execution exploits. These types of exploits inject “shellcode” to allow the attacker to run arbitrary commands on the remote computer. This type of attack is also known as remote code execution (RCE) and can potentially allow the attacker to take full control of the remote computer and turn it into a zombie.

A

RCE etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

XSS attack, an attacker inserts malicious scripts into a web page in the hopes of gaining elevated privileges and access to session cookies and other information stored by a user’s web browser. Use securing the browser techniques to secure.

XSRF : one click attack where the users browser is compromised and transmits unauthorized commands to a website. The chances of this attack can be reduced by requiring tokens on web pages that contain forms, special authentication techniques (possibly encrypted), scanning .XML files (which could contain the code required for unauthorized access), and submitting cookies twice instead of once, while verifying that both cookie submissions match.

normalization, which is the ability to avoid or reduce data redundancies and anomalies—a core concept within relational DBs.

A

XSS/XSRF etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly