(8) Securely Coding Flashcards

1
Q

When it comes to secure coding issues, describe deferencing

A

Deferencing is normally due to a null pointer issue, it means that if there is a value of NULL (isn’t set) it can cause a crash of the program unless an error handler is present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When it comes to secure coding issues, describe deferencing

A

Deferencing is normally due to a null pointer issue, it means that if there is a value of NULL (isn’t set) it can cause a crash of the program unless an error handler is present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When it comes to secure coding issues, what is an insecure object reference?

A

An insecure object reference is when an app exposes information about internal objects, which lets bad people see how the object is identified and stored on the back end. Bad peeps can then use this information to go after other items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When it comes to secure coding issues, what is a race condition?

A

Race conditions are all about timing. An app has to do something and may be sensitive to what is happening or has happened to an object. Race conditions aren’t reliable, but they can be very impactful and can result in attackers achieving in their goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In relation to common software security issues, describe broken authentication

A

With broken authentication, authentication can allow attackers who are not logged in or who are not logged in with the proper rights, have access to resources. Strong authentication and authorization is an important part of coding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In terms of insecure coding practices, describe sensitive data exposure

A

Sensitive data exposure can happen when any number of flaws are taken advantage of. The simple example of this is when apps don’t protect data properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In terms of insecure coding practices, describe insecure components

A

Insecure components comprise a ton of issues that are possible when a component of an application has a security weakness, it opens the entire app to that weakness. Avoiding this take an understanding of the components and modules that make up an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When it comes to secure coding practices, describe insufficient logging and monitoring

A

Insufficient logging and monitoring is about being able to see what happened when something goes wrong. The app needs to be coded to log events properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When it comes to securing coding practices, describe weak or default configurations

A

Walk or default configurations happen when apps are not properly set up or when default settings or used. Default settings include having a default password or other default settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In terms of secure coding practices, describe use of insecure functions

A

Using functions that not secure (such as those that don’t have security features built in), can make it easier for attackers to target and succeed in their attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly