Les 7 & 8 Flashcards

(11 cards)

1
Q

wat is IDOR

A

InsecureDirect Object References - an authorization failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

op welke 3 dingen kunnen IDOR op gebeuren

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

wat is een CSRF attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

op welke 2 manieren kan je CSRF attacks tegengaan

A

anti-csrf tokens
same site cookie attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

als je anti-csrf tokens gebruikt, waar gaat in het stappenplan de attack falen

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

als je de same site cookie attribute gebruikt, waar gaat in het stappenplan de attack falen

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

welke 3 levels heeft de same site cookie attribute en wat beteken ze

A

The cookie samesite attribute can be strict, lax or none. “Strict” samesite cookies are never sent when initiated from another domain. “Lax” samesite cookies are present on top-level navigation requests, which is secure enough in most cases. “None” cookies are always sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

threat modeling

welke 4 stappen in de vicieuze cirkel zijn er van thread modeling

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

threat modeling

A hurricane pours rain on my picnic due to it being in open space which leads to wet food and wet equipment (with a 55% chance).

welke delen van deze zin zijn hier de volgende dingen:
- asset
- vulnerability
- threat
- threat actor
- frequency
- impact

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

threat modeling

An internet attacker defaces the public website due to improper output validation which leads to reputational loss with an estimated frequency of once a month.

welke delen van deze zin zijn hier de volgende dingen:
- asset
- vulnerability
- threat
- threat actor
- frequency
- impact

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

threat modeling

welke 4 stappen volgt thread modeling

A
  1. identify main components
  2. identify assets
  3. identify threats & threat actors
  4. think about the controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly