Ch. 11 - Vocab Flashcards

1
Q

atomic operation

A

an operation that will always be executed without any other process being able to read or change state that is read or changed during the operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

canonicalization

A

transforming input data to a single, standard, minimal representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

code injection

A

where the input includes code that is then executed by the attacked system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

command injection

A

input is used in the construction of a command that is executed by the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cross-site scripting attack

A

input provided to a program by one user that is subsequently output to another user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

defensive programming

A

also known as secure programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

environment variable

A

collection of string values inherited by each process from its parent that can affect the way a running process behaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

fuzzing

A

software testing technique that uses randomly generated data as inputs to a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

injection attack

A

when program input data can influence the flow of execution of the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

least privilege

A

programs should execute with the least amount of privileges needed to complete their function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

memory leak

A

steady reduction in memory available on the heap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

privilege escalation

A

if privileges of the program is greater than those that are already available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

race condition

A

when multiple processes compete to gain uncontrolled access to some resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

regular expression

A

a pattern composed of a sequence of characters that describe allowable input variants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

secure programming

A

designing software so it continues to function even when under attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

software quality

A

concerned with the accidental failure as a result of some unanticipated input

17
Q

software reliability

A

also known as software quality

18
Q

software security

A

application of techniques that assess, mitigate, and protect software systems from vulnerabilities

19
Q

SQL injection

A

enter SQL commands by prematurely ending the text string

20
Q

XSS reflection

A

attacker includes the malicious script content in data supplied to a site