What is Alternate Encodings?
Canonicalisation
How is Numeric Input validated?
What is Input Fuzzing?
Disadvantages:
How do you ensure Machine Language Corresponds to Algorithm?
How to Correctly use memory?
What is Race condition?
Example: Withrdrawing money at the same time
What is a Deadlock?
Deadlock occurs when there is a conflict of a shared resource –
“Waiting for another for who is using the same resource”
What is Environment Variables?
What is the use of Least Privileges?
What is Root/Administrator Privileges?
System calls and Standard Library Functions
How to prevent Race Conditions?
What is a Lockfile?
Process must create and own the lockfile to gain access to shared resource
Concerns:
How to Safely use Temporary Files
What is Malware Countermeasures?
List the 4 main elements of prevention + Threat mitigation
Solution of malware prevention
Four main elements of prevention
Threat mitigation options:
Generations of Anti-Virus software
3. Third generation: **Activity Traps**
What is Generic Decryption? List what GD scanner contains
Anti-virus detects the complex polymorphic viruses + malware
Run GD scanner which contains:
What is Host-Based Behaviour Blocking Software?
A host computer that monitors the program behaviour in real time for malicious action
What are the Two types of monitoring software?
Ingres monitors:
Engress monitors:
_Monitors traffic signs scanning + suspicious behaviour _
What is Worm Countermeasure? What are the 6 defences?
Anti-virus can detect + remove it
Worm defences:
What are the four lines of DOS Attack Defence?
Four lines of defence against DDoS attacks:
What is DOS Attack Prevention?
CAPATCHA (Completely Automated Public Turning test to tell Computer and Humans Apart –
to distinguish human request
How to respond to DOS attacks?
Steps to responding to DOS Attack
(Capture + analyse packets
Block attack traffic upstream)