Chapter 11 Flashcards
Defensive or Secure Programming
the process of designing and implementing software so that it continues to function even when under attack
injection attack
wide variety of program flaws related to invalid handling of input data
This problem occurs when program input data can accidentally or deliberately influence the flow of execution of the program
command injection
the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server
SQL injection
The user-supplied input is used to construct a SQL request to retrieve information from a database
code injection
the input includes code that is then executed by the attacked system
cross-site scripting (XSS) attacks
concerns input provided to a program by one user that is subsequently output to another user.
XSS reflection vulnerability
The attacker includes the malicious script content in data supplied to a site