902 - Systems and Application Security Flashcards

(14 cards)

1
Q

Application Security Approaches - Design Review

A

Before code is written the application’s architecture and design can be reviewed for security problems. A common technique in this phase is the creation of a threat model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Security Approaches - White-Box Testing/Code Review

A

Critical examination of internal structure, architecture, design, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application Security Approaches - Black-Box Testing

A

Tests functionality rather than internal structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Application Security Approaches - Automated Tooling

A

Many security tools can be automated through inclusion into the development or testing environment. Examples of those are automated DAST/SAST tools that are integrated into code editor or CI/CD platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DAST/SAST

A

(Static Application Security Testing) and DAST (Dynamic Application Security Testing) are complementary security methodologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application Security Approaches - Coordinated Vulnerability Platforms

A

These are hacker-powered application security solutions offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CI/CD Platforms

A

Continuous Integration/Continuous Deployment
These platforms automate software testing, integration, and delivery, accelerating development pipelines and enhancing code quality. This is GitLab, Azure DevOps, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Common/Critical Security Threats - Broken Access Control

A

Generally includes identification, authorization, authentication, access approval, and audit (usernames, passwords, MFA, etc.)
This is “broken” when applications fail to properly restrict user actions, allowing unauthorized access to data, modification of resources, privilege escalation, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Common/Critical Security Threats - Cryptographic Failures

A

When sensitive data is not properly protected by encryption, algorithms, or key management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common/Critical Security Threats - (Code) Injections

A

A computer security exploit where a program fails to correctly process external data, causing it to interpret the data executable command. Attackers inject code into a program while its running.
This is caused by vulnerabilities when an app sends untrusted data to an interpreter, like an SQL database or XML parser.
“Who’s on First?” but in coding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Common/Critical Security Threats - Insecure Design

A

Not a coding error but a failure to embed security into design, requiring remediation through better planning, threat modeling, and secure design patterns, rather than just patching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Common/Critical Security Threats - Security Misconfiguration

A

Back-end/Admin issues that incorrectly set up systems to allow unauthorized data access, system, breaches, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Common/Critical Security Threats - Vulnerable and Outdated Components

A

Use of third-party code that is outdated or requires patches. Like if the OS is no longer supported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly