.06 RG Vocab application security Flashcards

1
Q

Application

A

A program built to allow a user to perform a specific function or set of
functions on a computer including mobile devices, desktops, tablets, smart devices,
automobiles, manufacturing systems, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Burp Suite

A

A proxy tool created by PortSwigger that is used extensively in application
penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Desktop Application

A

Usually designed for more significant tasks compared to mobile
applications, with more processing resource needs and options for outputs and interactions
within the system and for external programs or application processing interfaces (APIs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mobile Application

A

Software optimized for use on a mobile device, often with
functionalities specific to a handheld device (GPS location/motion, camera, voice). It can be
run only on a desktop computer through an emulator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OWASP

A

The Open Web Application Security Project is a nonprofit, community-driven
organization dedicated to training, research, and improvements in application security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OWASP Top 10

A

A list of the top 10 vulnerabilities published by OWASP every few years,
which combines data from actual breaches, alerts, reports, and community feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Progressive Web Application

A

A desktop application coded to work in both mobile and
desktop formats from a single code base, adjusting visually when interacting on a mobile
device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Server-Side Request Forgery

A

An SSRF attack that uses malformed URLs to access, read,
and possibly impact server resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DevOps

A

Practices aimed at unifying software development and IT operations to avoid
outages and bugs resulting from poor internal communication during the SSDLC (Daniel
Miessler, 2022)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DevSecOps

A

Aims to increase application security through the build process by introducing
communication and using vulnerability scanning and fuzzing tools during each step in the
SSDLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure Software Development Lifecycle (SSDLC)

A

A phase-based methodology for
delivering software applications quickly, securely, and cost-effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Shift-Left Testing

A

The concept of shifting testing to the left or earlier when building
applications to cut down on costly and dangerous misconfigurations that are more difficult
to undo later in the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dynamic Application Security Testing (DAST)

A

Tools that test the configuration and
security of applications as they run in real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fuzzing

A

The practice of sending nonsense data into an application in an automated
manner to test the app’s security, resilience, and validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OWASP ZAP

A

An open-source application scanning app, with a command line interface (CLI)
and a graphical user interface (GUI), that records all actions taken against an application in a
database for review and further testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identify Phase (SSDLC)

A

What problem is this application trying to solve?

17
Q

Plan Phase (SSDLC)

A

The project is approved, and teams are assigned their roles and tasks

18
Q

Design Phase (SSDLC)

A

The application architecture (or Stack) is planned into a single
model.

19
Q

Build Phase (SSDLC)

A

Developers code the solution and perform peer review during
development.

20
Q

Test Phase (SSDLC)

A

The application is functional and can be tested for weaknesses in
functionality or security.

21
Q

Deploy Phase (SSDLC)

A

The solution is completed and shipped to users.

22
Q

Maintain Phase (SSDLC)

A

The application is monitored for performance and dependency
breakage, while improvements and versioning are folded into new SSDLC sprints.