6.2 Application Security Flashcards

1
Q

*
Mobile, embedded, and IoT devices are_____________; security programs should include them.
*

A

prevalent and vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Compromised devices can lead to consequences ranging from ____________ to ______________

A

embarrassing to fatal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

*
Mobile devices are increasingly vulnerable due to (4)?
*

A

powerful hardware, constant network connectivity, and movement between environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__________ _____________ include smartphones, tablets, head-mounted devices, and smartwatches, performing similar functions to non-mobile computers.

A

Mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

*
The line between __________ and ____________has blurred, with some smartphones rivaling computer power and some computers running mobile operating systems.

A

mobile devices and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

*
Businesses typically use__________ and _____________ to maintain mobile device security.

A

software and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

*
__________________solutions allow central control of devices, including patching, password changes, and software regulation.

A

Mobile device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

*
Management solutions use agents on devices to _______________________

A

enforce configurations and can remotely wipe or disable devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

*
Organizations often have __________ policies regulating personal and corporate device use in the workplace.

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

*
_________________ are easier to manage centrally, allowing stricter control over apps and security settings.

A

Corporate-owned devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

*
__________ ________________may have limited management capabilities, potentially subverted by savvy users.
*

A

Personal devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Many organizations allow a mix of personal and corporate-owned devices with varying levels of _______________ and ______________.

A

access and security features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

*
Mobile devices face several specific security issues, including__________________________.

A

baseband operating system vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

*
The baseband operating system handles_______________ and ____________________.
*

A

hardware functions and is often proprietary and infrequently updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Baseband vulnerabilities can lead to attacks like ___________________________.
*

A

spying on cell phone communications via SS protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____________ removes manufacturer restrictions, often disabling security features and leaving devices vulnerable.
*

A

Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Jailbreaks typically require
_____________to bypass security, sometimes disabling features or patching files permanently.
*

A

exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_____________ patch jailbreak vulnerabilities in new OS versions, leading to a ___________ being developed.
*

A

Vendors; cycle of new jailbreaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Management solutions and anti-malware apps can help ______________________.

A

prevent or detect jailbreaking attempts.
*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____________can compromise mobile device security by exploiting granted privileges.

A

Malicious apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

*
Even official app stores aren’t completely safe from malicious apps, as shown by ____________________

A

cryptocurrency app incidents.
*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Jailbroken devices are especially vulnerable to___________________.

A

malicious apps from unofficial sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

*
To protect against malicious apps, stick to _____________ and avoid _____________.

A

official app stores; jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

*
Lack of________ ____________for mobile devices and apps can cause major security problems.
*

A

timely updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Manufacturers often ______________ older devices, leaving them vulnerable to new security threats. *
stop updating
26
App updates can also be ____________, especially for _____________with less consistent support.
problematic; smaller apps
27
* Users can mitigate update issues by choosing devices from __________________.
vendors with better update track records.
28
* Embedded devices are _________________.
computers inside other devices, performing single functions in various applications.
29
* ________________ and ________________systems commonly use embedded devices to control critical infrastructure.
Industrial control systems and SCADA
30
* Attacks on _________________ can have physical world impacts, as demonstrated by ____________. .
industrial control systems; Stuxnet
30
* Many industrial control systems run on proprietary _________ with_______________ similar to mobile baseband systems.
RTOSs; security issues
31
* _________________ aren't foolproof protection against attacks on industrial control systems.
Air-gapped networks
32
* _____________________systems range from vital signs monitors to implanted devices like pacemakers. *
Medical devices with embedded
33
Security vulnerabilities in medical devices can have life-threatening consequences, as shown by the ___________ _______________issue.
Medtronic pacemaker
34
*___________ can have up to 70 embedded devices communicating over a ___________ to control various functions. *
Cars ; CAN bus
35
_________ ____________ has demonstrated the potential for remote control of vehicle functions, posing serious safety risks.
Car hacking
36
* _____________ embedded devices can be challenging or impossible, especially for_________ _________devices.
Upgrading; implanted medical
37
* The hardware in embedded devices is typically expected to __________________ of the containing device.
last the lifetime
38
* Compromised embedded devices can have huge ____________ and critical _____________.
physical impacts on human safety - infrastructure
39
* _________________ may target embedded devices controlling essential systems like power and water. *
Nation-state attacks
40
Vendors and _____________ are increasing attention to embedded device security, with more training available. *
governments
41
________ devices are becoming more prevalent in everyday appliances, bringing new security challenges. *
IoT
42
The term "Internet of Things" was coined in ____ and now refers to any _____________________without a ____________.
1999; internet-connected device ; full desktop OS
43
* Network printers are common _____________with complex operating systems and potential security vulnerabilities. *
IoT devices
44
Networked surveillance cameras are often vulnerable due to simple________________ or __________________. *
default credentials or backdoors.
45
Smart locks and other physical security IoT devices can have serious vulnerabilities, as demonstrated by the _____________________ issue.
Tapplock (smart padlock) issues.
46
* The line between embedded and IoT devices is fuzzy, with some key differences in ____________ and ____________. *
design and connectivity.
47
IoT devices often lack ________________ in their operations, making it difficult to detect ___________________. *
transparency; unusual behavior
48
The proliferation of IoT devices has led to large-scale attacks, such as the_______________attack. *
Mirai botnet DDoS
49
_____________ IoT devices pose ongoing security risks, as many older devices remain in use without _________. *
Outdated - updates
50
Updating older IoT devices can be challenging, especially for ________________ users
non-technical
51
Describe Bounds checking -
When you don't properly account for the size of data input into your application
52
What does a fuzzing tool do?
a technique to bombard an application with data and input from all sources to get it to fail or act strangely.
53
Give an example of a race condition.
Saving a document in the cloud at the same time another person does; which document truly saves the latest version. Occurs when multiple threads within a process control access to a particular resource and the correct handling depends on timing or transactions.
54
Why is it important to remove extraneous files from a web server?
attackers could use against your system, ie..source code
55
What does the tool Burp Suite do and in what situation might you use it?
Web analysis too; discover, exploit, and mitigate security vulnerabilities. When you need to scan a web application for security vulnerabilities, Burp Scanner can automate this process
56
Name the two main categories of web security.
Client Side and Server Side
57
Is a SQL injection attack an attack on the database or an attack on the web application?
Database attack
58
Why is input validation important?
Could leave you open to a format string attack if user input isn't in correct format.
59
Explain a cross-site request forgery attack and what you might do to prevent it.
Log out of websites and close those windows when finished.
60
How might you use a sniffer to increase the security of your applications
You can watch specific network traffic that is being exchanged.
61
How can you prevent buffer overflows in your applications?
Use bounds checking to limit the amount of data you take in
62
What is cross site scripting (XSS)? Is it client side or server side attack?
Attacks inserts code in a scripting language into a page or other media like adobe -; displayed by the client browser. Client side attack.
63
What is a directory transversal attack? Is it client side or server side attack?
When you don't validate input into web applications - Server Side Attack
64
Is clickjacking client side or server side attack?
client side
65
A ______________ occurs when multiple threads within a process control access to a particular resource and the correct handling depends on timing or transactions.
race condition
66
______________________is a data-network packet analyzer computer program that runs under a command line interface. It is not a type of tool categorized as an exploit framework.
TCPdump
67
_______________is a centralized penetration testing tool that enables security teams to conduct advanced, multi-phased penetration tests. It is a type of tool categorized as an exploit framework. Exploit frameworks include pre-packaged sets of exploits.
Core Impact