Ch 1 - National Security Assessment Flashcards
Warez
Pirated Media
IIASA
International Institute of Applied System Analysis
Defender’s Dilemma
a defender must ensure the integrity of an entire system, but an attacker only needs to exploit a single flaw.
Zero-day exploits
cyber attack targeting a software vulnerability which is unknown to the software vendor or to antivirus vendors
MITM
Man in the middle attack
XXE
XML external entity (XXE) parsing - used toattack Web Applications
Shellshock
Vulnerability in Unix bash
Static Analysis
Auditing application source code, server configuration, infrastructure configuration, and architecture
EAL4
Evaluation Assurance Level 4 - methodically
designed, tested, and reviewed
NIST
National Institute of Standards and Technology
DISA
Defence Information Systems Agency
OWASP
Open Web Application Security Project - list of common
web application flaws
XXS
Cross-site scripting
CSFR
Cross-site script forgery
Attack surfaces?
Client software, Server software, Web application