Soft Sec Final Flashcards
(48 cards)
Difference between software security engineering and software engineering
software engineering is focused on building/making software, whereas software security is focused on the software’s security features
Difference between software testing and security testing
software testing is looking for bugs whereas security testing is trying to find vulnerabilities
Define penetrate and patch
A design flaw of poor coding that may allow an attacker to cause damage
Vulnerability
Software, data, or commands that take advantage of a weakness to cause unanticipated or unexpected beahviour
Exploit
An actor or agent that is a source of danger to a system
Threat
Failure of human cognition that can lead to problems
Human Error
Difference between a vulnerability and an exploit
vulnerability is a bug or flaw within the code, whereas the exploit is the action of manipulating the vulnerability
What is the recommended approach for mitigating SQL Injection vulnerabilities?
Sanitize all inputs and data validation
What does STRIDE?
Spoofing, Tampering, Repudiation, Information, Denial of Service, Elevation of Privilege
What does CIA stand for?
Confidentiality, Integrity, Availability
In session hijacking, you can attack someone by pretending to be them by stealing their information. Which part of the system are you violating?
Authentication
What is true about pen testing?
Is about attempting to exploit as much as possible, demonstrates the person-hours required to break into a system, requires a working system
What is functional and adversarial security testing?
Functional tests the security mechanisms defined in the requirements, whereas adversarial testing uses a risk based approach to simulate an attacker
Difference between misuse and abuse cases?
abuse cases are ways to exploit/take advantage whereas misuse are mistakes
What are some examples of security by obscurity?
Placing admin page on a web page that has no links, and requiring a difficult to guess password for authnetication
What is defense in depth?
someone breaks the first line of protection, but they cannot get any further
What is least privilege?
Every user or module should be allowed minimum access required
What does is mean to fail securely?
Make sure the error messages and exceptions do not reveal information or leave the system vulnerable
What does is mean to have security by default?
Configure the system so you dont have to rely on your users to user it correctly
What three statements of risk is true?
The risk associated with an event is the probability the event will happen times the expected damage of that event, risk=p(occurrence)impact, security risk=p(vulnerability)value of asset
Do trusted messages need verification?
No, but untrusted messages do
What is an example of a side channel attack?
using javascript to exercise a wifi chip so that it emits pulses of electromagnetic waves such that an AM radio can pick up the signal and leak
what is an example of multifactor authentication?
Requiring the original invite to a party in addition to recognizing you invitees, and scanning an ID badge and entering PIN number on a keypad to open a door