Week 5 Flashcards

(18 cards)

1
Q

Why is software difficult to secure?

A

It’s often under-resourced and security is added as an afterthought, making it vulnerable to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Common Weakness Enumeration (CWE)?

A

A community-driven list of software security vulnerabilities maintained by MITRE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the OWASP Top 10?

A

A list of the 10 most critical web application security risks identified by the Open Web Application Security Project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When should security requirements be defined?

A

At the requirement specification stage, not added later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name three components of secure software development.

A

Defensive coding, functional testing, backup & data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is secure development everyone’s concern?

A

All developers play a role in ensuring code quality, repository protection, and secure deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Cross-Site Scripting (XSS)?

A

Injection of malicious scripts into trusted web pages viewed by other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the two main types of XSS.

A

Reflected (non-persistent) and Stored (persistent) XSS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give one XSS prevention technique.

A

Escape untrusted data before inserting it into HTML, JS, or CSS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is SQL Injection?

A

Injection of SQL commands via unsanitized input, modifying database queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four risk control strategies?

A

Avoid, Accept, Refuse, Transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does patching do?

A

Fixes software bugs to remove vulnerabilities, preventing exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of change control?

A

To manage risks when modifying software, reducing introduction of new flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between certification and accreditation?

A

Certification confirms a product/system meets requirements; Accreditation recognises the certifying body.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When is accredited certification typically mandated?

A

For safety - or security - critical systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does ISO 27000 require regarding environments?

A

Separation of live and development systems.

17
Q

Name one way to secure a development environment.

A

Run training and testing in non-live systems.

18
Q

What should security testing include?

A

Defensive code effectiveness, malware protection, backups, access control, and resilience.