SOFTtware Flashcards

(35 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data protection?

A

Safe from unauthorized access, manipulation, or theft

Data protection ensures the confidentiality, integrity, and availability of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does encryption do?

A

Encrypts data at rest and in transit

Ensures that intercepted data cannot be read without the encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define confidentiality in data security.

A

Ensures sensitive user data is encrypted before storage

Protects data even if the database is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is integrity in the context of data?

A

Prevents unauthorized modifications or tampering

Ensured by conducting data validation and integrity checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List common types of cyber attacks.

A
  • Malware infections
  • Ransomware incidents
  • Phishing scams
  • Denial of Service (DoS)
  • SQL injections
  • Cross-site scripting (XSS)
  • Distributed denial of service (DDoS)

These attacks disrupt operations and compromise data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the GDPR requirement regarding data breaches?

A

Notify users within 72 hours of a data breach

GDPR stands for General Data Protection Regulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the stages of the software development process?

A
  • Requirements definition
  • Determining specifications
  • Design
  • Development
  • Integration
  • Testing and debugging
  • Installation
  • Maintenance

Each stage is crucial for successful software deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do end users’ capabilities influence secure software design?

A
  • Low technical knowledge users need automatic security features
  • Advanced users prefer customizable security settings

User experience shapes the implementation of security features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or false: Clueless users prioritize convenience over safety.

A

TRUE

They are more likely to fall for phishing or social engineering attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the balance between usability and security?

A

Too much security can frustrate users; too little increases risk

A banking app should use MFA for security but also provide biometric authentication for ease of use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define availability in data security.

A

Ensures software and data are accessible when needed

Protects against DoS attacks, system failures, and data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is authorization in software security?

A

Controls what actions users can perform based on their roles

Uses role-based access control (RBAC) and least privilege principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does accountability ensure in a system?

A

Actions can be traced back to a responsible party

Implemented through audit logs and tracking changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of cryptography?

A

Protects sensitive data using encryption algorithms

Ensures data integrity and authenticity with digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is sandboxing?

A

Restricts applications from accessing system resources beyond their scope

Prevents malware from affecting the rest of the system.

17
Q

What is Privacy By Design?

A

Secure authentication is implemented before software deployment

Ensures data encryption and strong access controls are standard.

18
Q

What is the purpose of code review?

A

Peer review of code to detect security issues before deployment

Helps identify logic errors and security flaws.

19
Q

What is SAST?

A

Static Application Security Testing

Analyzes source code to find security vulnerabilities without executing the program.

20
Q

What is DAST?

A

Dynamic Application Security Testing

Identifies application vulnerabilities by attacking a running application.

21
Q

What is penetration testing?

A

Simulated cyberattack by ethical hackers to exploit vulnerabilities

Helps prevent unauthorized access and data breaches.

22
Q

What is a vulnerability assessment?

A

Process of identifying, analyzing, and prioritizing security weaknesses

Aims to address weaknesses before they can be exploited.

23
Q

What does input validation prevent?

A

Prevents SQL injection, XSS, and buffer overflow attacks

Ensures data integrity and security.

24
Q

What is the purpose of error handling?

A

Prevents leakage of sensitive system information

Uses generic error messages instead of exposing system details.

25
What is **secure API development**?
APIs must be designed to prevent unauthorized access ## Footnote Involves using authentication and authorization methods.
26
What is **memory management**?
Ensures safe allocation and freeing of memory ## Footnote Prevents issues like buffer overflows and memory leaks.
27
What does **session management** control?
How users stay logged in and interact securely with a system ## Footnote Involves generating unique session IDs and invalidating them on logout.
28
What is **exception management**?
Handles unexpected errors without exposing sensitive details ## Footnote Errors are logged securely for developers.
29
What is **XSS**?
Cross-site scripting where an attacker injects malicious JavaScript ## Footnote Can steal cookies or modify page content.
30
What is **CSRF**?
Cross-site request forgery tricks a logged-in user into sending a malicious request ## Footnote Can lead to unauthorized actions on behalf of the user.
31
What is a **Content Security Policy (CSP)**?
A browser security feature that controls what content a webpage can load ## Footnote Helps stop attacks like XSS.
32
What is **invalid forwarding and redirecting**?
Occurs when a web application redirects users without validating input ## Footnote Can lead users to malicious websites.
33
Define **race conditions**.
When multiple processes try to access shared data simultaneously ## Footnote Can lead to inconsistent data states.
34
What are **file attacks**?
Happen when a hacker tricks a system into opening or running unauthorized files ## Footnote Prevented by checking file names and limiting upload types.
35
What are **side channel attacks**?
Steal information by observing system behavior rather than breaking code ## Footnote Can be prevented by adding randomness to calculations.