1.6 Flashcards

1
Q

race conditions.

A

Time-of-check-to-time-of-use (TOCTTOU) attacks are often called race conditions because the attacker is racing with the legitimate process to replace the object before it is used. Another form of race condition attack occurs when two processes are running concurrently and one process is designed to finish first, but the attack alters the processing to change the order of completion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

end-of-life systems

A

End-of-life systems are those that are no longer receiving updates and support from their vendors. If an organization continues to use an end-of-life system, then the risk of compromise is high because no future exploitation will ever be patched or fixed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

embedded systems

A

An embedded system is any form of computing component added to an existing mechanical or electrical system for the purpose of providing automation and/ or monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Realize that there may be a lack of vendor support

A

Any system, whether hardware or software, will become more insecure over time once it lacks vendor support. The lack of vendor support can be due to end-of-life dropping of support, but it can also be a “feature” of the product all along, where the vendor does not provide any improvement, support, or patching/ upgrading of the product after the initial sale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Understand improper input handling.

A

Many forms of exploitation are caused by the lack of input sanitization or validation. Only with proper input handling can software exploitation be reduced or eliminated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Know proper input handling.

A

There are three main forms of input filtering that should be adopted by every programmer and included in every code they author: check for length, filter for known malware patterns, and escape metacharacters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Understand improper error handling.

A

Improper error handling may allow for the leaking of essential information to attackers or enable attackers to force a system into an insecure state. If error messages are not handled properly, they may disclose details about a flaw or weakness that will enable an attacker to fine-tune their exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

misconfiguration/ weak configuration.

A

When misconfigurations or weak configurations are allowed to remain while a system is in active productive use, the risk of data loss, data leakage, and overall system compromise is higher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

risks of default configuration.

A

Default configurations should never be allowed to remain on a device or within an application. The tyranny of the default is the fact that defaults are usually insecure and thus leave a system open to simple compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

resource exhaustion

A

Resource exhaustion occurs when applications are allowed to operate in an unrestricted and unmonitored manner so that all available system resources are consumed in the attempt to serve the requests of valid users or in response to a DoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

untrained users

A

Untrained users are more likely to make mistakes or abuse a system’s resources and capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

improperly configured accounts

A

Untrained users are more likely to make mistakes or abuse a system’s resources and capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

vulnerable business processes.

A

All business tasks, processes, procedures, and functions should be assessed as to their importance to the organization and their relative vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

weak cipher suites and implementations

A

Many older algorithms or implementations of algorithms have known flaws, weaknesses, or means of compromise. These weaker ciphers should be avoided and disabled and replaced with stronger cipher suites with few or no issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

memory leaks.

A

A memory leak occurs when a program fails to release memory or continues to consume more memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

integer overflow.

A

An integer overflow is the state that occurs when a mathematical operation attempts to create a numeric value that is too large to be contained or represented by the allocated storage space or memory structure.

17
Q

buffer overflow.

A

A buffer overflow is a memory exploitation that takes advantage of a software’s lack of input length validation. In some cases a buffer overflow can allow for the injection of shellcode (precompiled malicious code) into memory, where it may become executed with system-level privileges.

18
Q

pointer dereference.

A

Pointer dereferencing is the programmatic activity of retrieving the value stored in a memory location by triggering the pulling of the memory based on its address or location as stored in a pointer.

19
Q

DLL injection.

A

DLL injection is an advanced software exploitation technique that manipulates a process’s memory in order to trick it into loading additional code and thus perform operations the original author did not intend.

20
Q

Comprehend system sprawl/ undocumented assets.

A

System sprawl or server sprawl is the situation where numerous underutilized servers are operating in your organization’s server room. The existence of undocumented assets is a form of wasted resources and lost opportunity.

21
Q

architecture/ design weaknesses.

A

Architecture or design flaws are mistakes in the overall concept, theory, implementation, or structure of an application. Design flaws may exist because of a misunderstanding of the problem that was intended to be solved, not understanding the requirements of the solution, violating common or good practice design principles, or failing to account for security measures during initial conception.

22
Q

new threats.

A

New threats are being developed by hackers on a nearly daily basis. It is an essential part of security management to be aware of new threats.

23
Q

improper certificate and key management.

A

Most of the failures of a cryptosystem are based on improper key management rather than on the algorithms.