Chapter 11 Flashcards

Software security

1
Q

Web app security flaws

A
  1. unvalidated input
  2. cross-site scripting
  3. Buffer overflow
  4. injection flaws
  5. improper error handling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

reducing software vulnerabilities

A
  1. stop vulnerabilities before occur
  2. find vulnerabilities before exploited
  3. reduce impact of vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SAFECode

A

Software assurance forum for excellence in code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

canonicalization

A

transforming input data into single standard, minimal representation -> to compare to single representation of acceptable input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Input fuzzing

A

randomly generate data as input to program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

writing safe program code

A
  1. Correct algorithm implementation - no debugging code
  2. Ensure machine code corresponds to algorithm - compiler might be hacked
  3. Correct data interpretation - restrict + validate interpretation of data vars
  4. Correct use of memory
  5. race conditions - 2 threads try to access at same time - deadlock /corrupted values
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Environment vars

A

collection of string values inherited by each process from parent- can be modified by program process at any time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Use of least privilege

A
  1. privilege escalation - may give privileges to attacker
  2. least privilege - run with least privilege needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Root/administrator privileges

A

programs with root privileges = target
- often privilege only needed at start
- partition into smaller modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

preventing race conditions - lockfile

A

process must create + own lockfile to gain access - all programs must cooperate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Safe temporary files

A
  • temporary files in common shared system area
  • must be unique
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

handling program output

A
  1. output stored ,sent , displayed
  2. identify what is permissible output content + filter
  3. defined character set
How well did you know this?
1
Not at all
2
3
4
5
Perfectly