Terms Flashcards
(121 cards)
What is an Abstract Syntax Tree?
A tree representation of the structure of source code. Used in static code analysis to identify vulnerabilities by parsing and analyzing the code’s logic.
What is an Active Scanner?
A security tool that interacts with applications to identify vulnerabilities, such as SQL injection or XSS, by sending requests and analyzing responses.
What is Agile Methodology?
An iterative software development framework. Used in AppSec for incorporating security testing in shorter cycles, such as in DevSecOps.
What is Alpha Level Testing?
Early-stage testing within the development environment to identify critical bugs before the beta phase.
What is Application Decomposition?
Breaking an application into smaller components for detailed threat analysis, often during threat modeling.
What is Application Security?
Practices to protect software applications from threats. Includes secure coding, testing, and remediation processes.
What is Application-Centric Threat Modeling?
Analyzing potential threats from the application’s perspective, focusing on architecture, design, and user interaction.
What does AppSec stand for?
Short for Application Security; the discipline of securing applications against vulnerabilities throughout the SDLC.
What is the Architecture (A2) Phase?
A phase in secure development lifecycle focused on designing robust and secure application architecture.
What is Asset-Centric Threat Modeling?
Focusing on critical assets (e.g., data, systems) when identifying and prioritizing threats.
What are Authenticated Scans?
Scans performed with access credentials to assess vulnerabilities that are only visible to authenticated users.
What are Benchmarks?
Standards or baselines used to measure security posture.
Examples include CIS benchmarks.
What is Beta Level Testing?
Testing conducted by real users in a controlled environment to discover issues before full release.
What is Black Box Testing?
Testing without knowledge of the internal structure. Mimics an external attacker’s approach.
What is the Building Security In Maturity Model (BSIMM)?
A framework to measure and improve software security practices across organizations.
What is Code Review?
Manual or automated inspection of source code to identify vulnerabilities like logic flaws or insecure coding practices.
What does CVE stand for?
Common Vulnerabilities and Exposures: A standardized list of publicly disclosed security vulnerabilities.
What is CVSS?
Common Vulnerability Scoring System: A scoring system to evaluate the severity of vulnerabilities.
What is the Construction phase in SDLC?
A phase in SDLC focusing on writing, debugging, and integrating code securely.
What is Control Flow Analysis?
Evaluating the flow of control in code to identify potential vulnerabilities like infinite loops or privilege escalations.
What is Data Flow Analysis?
Analyzing the flow of data through an application to detect leaks or vulnerabilities.
What are Data Flow Diagrams (DFDs)?
Visual representations of data movement in a system, used in threat modeling.
What is a Denial of Service (DoS) attack?
Attacks aiming to disrupt service availability, often by overwhelming system resources.
What is the Deployment Phase in SDLC?
The phase where software is delivered to the production environment.