6.2 Application Security Flashcards

1
Q

*
Mobile, embedded, and IoT devices are_____________; security programs should include them.
*

A

prevalent and vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Compromised devices can lead to consequences ranging from ____________ to ______________

A

embarrassing to fatal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

*
Mobile devices are increasingly vulnerable due to (4)?
*

A

powerful hardware, constant network connectivity, and movement between environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__________ _____________ include smartphones, tablets, head-mounted devices, and smartwatches, performing similar functions to non-mobile computers.

A

Mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

*
The line between __________ and ____________has blurred, with some smartphones rivaling computer power and some computers running mobile operating systems.

A

mobile devices and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

*
Businesses typically use__________ and _____________ to maintain mobile device security.

A

software and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

*
__________________solutions allow central control of devices, including patching, password changes, and software regulation.

A

Mobile device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

*
Management solutions use agents on devices to _______________________

A

enforce configurations and can remotely wipe or disable devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

*
Organizations often have __________ policies regulating personal and corporate device use in the workplace.

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

*
_________________ are easier to manage centrally, allowing stricter control over apps and security settings.

A

Corporate-owned devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

*
__________ ________________may have limited management capabilities, potentially subverted by savvy users.
*

A

Personal devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Many organizations allow a mix of personal and corporate-owned devices with varying levels of _______________ and ______________.

A

access and security features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

*
Mobile devices face several specific security issues, including__________________________.

A

baseband operating system vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

*
The baseband operating system handles_______________ and ____________________.
*

A

hardware functions and is often proprietary and infrequently updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Baseband vulnerabilities can lead to attacks like ___________________________.
*

A

spying on cell phone communications via SS protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____________ removes manufacturer restrictions, often disabling security features and leaving devices vulnerable.
*

A

Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Jailbreaks typically require
_____________to bypass security, sometimes disabling features or patching files permanently.
*

A

exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_____________ patch jailbreak vulnerabilities in new OS versions, leading to a ___________ being developed.
*

A

Vendors; cycle of new jailbreaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Management solutions and anti-malware apps can help ______________________.

A

prevent or detect jailbreaking attempts.
*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____________can compromise mobile device security by exploiting granted privileges.

A

Malicious apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

*
Even official app stores aren’t completely safe from malicious apps, as shown by ____________________

A

cryptocurrency app incidents.
*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Jailbroken devices are especially vulnerable to___________________.

A

malicious apps from unofficial sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

*
To protect against malicious apps, stick to _____________ and avoid _____________.

A

official app stores; jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

*
Lack of________ ____________for mobile devices and apps can cause major security problems.
*

A

timely updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Manufacturers often ______________ older devices, leaving them vulnerable to new security threats.
*

A

stop updating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

App updates can also be ____________, especially for _____________with less consistent support.

A

problematic; smaller apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

*
Users can mitigate update issues by choosing devices from __________________.

A

vendors with better update track records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

*
Embedded devices are _________________.

A

computers inside other devices, performing single functions in various applications.

29
Q

*
________________ and ________________systems commonly use embedded devices to control critical infrastructure.

A

Industrial control systems and SCADA

30
Q

*
Attacks on _________________ can have physical world impacts, as demonstrated by ____________.
.

A

industrial control systems; Stuxnet

30
Q

*
Many industrial control systems run on proprietary _________ with_______________ similar to mobile baseband systems.

A

RTOSs; security issues

31
Q

*
_________________ aren’t foolproof protection against attacks on industrial control systems.

A

Air-gapped networks

32
Q

*
_____________________systems range from vital signs monitors to implanted devices like pacemakers.
*

A

Medical devices with embedded

33
Q

Security vulnerabilities in medical devices can have life-threatening consequences, as shown by the ___________ _______________issue.

A

Medtronic pacemaker

34
Q

*___________ can have up to 70 embedded devices communicating over a ___________ to control various functions.
*

A

Cars ; CAN bus

35
Q

_________ ____________ has demonstrated the potential for remote control of vehicle functions, posing serious safety risks.

A

Car hacking

36
Q

*
_____________ embedded devices can be challenging or impossible, especially for_________ _________devices.

A

Upgrading; implanted medical

37
Q

*
The hardware in embedded devices is typically expected to __________________ of the containing device.

A

last the lifetime

38
Q

*
Compromised embedded devices can have huge ____________ and critical _____________.

A

physical impacts on human safety - infrastructure

39
Q

*
_________________ may target embedded devices controlling essential systems like power and water.
*

A

Nation-state attacks

40
Q

Vendors and _____________ are increasing attention to embedded device security, with more training available.
*

A

governments

41
Q

________ devices are becoming more prevalent in everyday appliances, bringing new security challenges.
*

A

IoT

42
Q

The term “Internet of Things” was coined in ____ and now refers to any _____________________without a ____________.

A

1999; internet-connected device ; full desktop OS

43
Q

*
Network printers are common _____________with complex operating systems and potential security vulnerabilities.
*

A

IoT devices

44
Q

Networked surveillance cameras are often vulnerable due to simple________________ or __________________.
*

A

default credentials or backdoors.

45
Q

Smart locks and other physical security IoT devices can have serious vulnerabilities, as demonstrated by the _____________________ issue.

A

Tapplock (smart padlock) issues.

46
Q

*
The line between embedded and IoT devices is fuzzy, with some key differences in ____________ and ____________.
*

A

design and connectivity.

47
Q

IoT devices often lack ________________ in their operations, making it difficult to detect ___________________.
*

A

transparency; unusual behavior

48
Q

The proliferation of IoT devices has led to large-scale attacks, such as the_______________attack.
*

A

Mirai botnet DDoS

49
Q

_____________ IoT devices pose ongoing security risks, as many older devices remain in use without _________.
*

A

Outdated - updates

50
Q

Updating older IoT devices can be challenging, especially for ________________ users

A

non-technical

51
Q

Describe Bounds checking -

A

When you don’t properly account for the size of data input into your application

52
Q

What does a fuzzing tool do?

A

a technique to bombard an application with data and input from all sources to get it to fail or act strangely.

53
Q

Give an example of a race condition.

A

Saving a document in the cloud at the same time another person does; which document truly saves the latest version.
Occurs when multiple threads within a process control access to a particular resource and the correct handling depends on timing or transactions.

54
Q

Why is it important to remove extraneous files from a web server?

A

attackers could use against your system, ie..source code

55
Q

What does the tool Burp Suite do and in what situation might you use it?

A

Web analysis too; discover, exploit, and mitigate security vulnerabilities. When you need to scan a web application for security vulnerabilities, Burp Scanner can automate this process

56
Q

Name the two main categories of web security.

A

Client Side and Server Side

57
Q

Is a SQL injection attack an attack on the database or an attack on the web application?

A

Database attack

58
Q

Why is input validation important?

A

Could leave you open to a format string attack if user input isn’t in correct format.

59
Q

Explain a cross-site request forgery attack and what you might do to prevent it.

A

Log out of websites and close those windows when finished.

60
Q

How might you use a sniffer to increase the security of your applications

A

You can watch specific network traffic that is being exchanged.

61
Q

How can you prevent buffer overflows in your applications?

A

Use bounds checking to limit the amount of data you take in

62
Q

What is cross site scripting (XSS)? Is it client side or server side attack?

A

Attacks inserts code in a scripting language into a page or other media like adobe -; displayed by the client browser. Client side attack.

63
Q

What is a directory transversal attack? Is it client side or server side attack?

A

When you don’t validate input into web applications - Server Side Attack

64
Q

Is clickjacking client side or server side attack?

A

client side

65
Q

A ______________ occurs when multiple threads within a process control access to a particular resource and the correct handling depends on timing or transactions.

A

race condition

66
Q

______________________is a data-network packet analyzer computer program that runs under a command line interface. It is not a type of tool categorized as an exploit framework.

A

TCPdump

67
Q

_______________is a centralized penetration testing tool that enables security teams to conduct advanced, multi-phased penetration tests. It is a type of tool categorized as an exploit framework. Exploit frameworks include pre-packaged sets of exploits.

A

Core Impact