Chapter 3 Flashcards

1
Q

Buffer overflows

A

A programming error relating the range of an array where the reference is out of bounds of the array.

Attackers first cause a system crash and then a controlled failure to bypass security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Buffer overflow countermeasures

A

Staying within bounds:
Check lengths before writing

Double check the boundary condition:
This is to catch off by one errors

Programming controls:
Code reviews
Independent testing

Code analysers:
Tools that inspect the code for errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mediation

A

Mediation is checking. Refers to checking an actors authorisation before taking an intended action.

Verifying an actor is authorised to perform the operation on the object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Incomplete mediation

A

The system allows incorrect input to be captured without checking the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Time-of-check to time-of-use-errors

A

Data is changed between access and use. There is a time lag between the two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Undocumented access point

A

Access is created for development but should be removed before production. A backdoor into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Off by one errors

A

Programmers exceed the array size by one because of incorrect checks on array size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Module testing

A

Same as component testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Component testing

A

Done after unit testing. The subject is tested independently of other components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Integration testing

A

Testing of multiple components integrating with each other. A combined testing of components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Functional testing

A

Tests if the system performs the functions as described by the requirements specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Performance testing

A

Tests the system under load for reliability, stability and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Acceptance testing

A

End to end testing of the system against the requirements specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Installation testing

A

Tests the system once it has been installed to verify it functions as it should

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malicious code

A

AKA malware - malicious software. Programs planted to cause undesired or unanticipated effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virus

A

A program that can replicate itself by modifying other non-malicious programs. It spreads through any medium

17
Q

Worm

A

A program that spreads through a network

18
Q

Trojan horse

A

Malicious code, that in addition to its primary effect has another malicious effect

19
Q

Virus transmission

A

Setup and installed programs
Attached file to e-mails
Document virus embedded within a document or spreadsheet
Autorun used to execute virus code at startup or even with USB

20
Q

Resident virus

A

Locates itself in memory

21
Q

Rabbit

A

Code that replicates itself without limit to exhaust resources

22
Q

Script attack

A

Normally JavaScript. Code that is executed when displaying a web page

23
Q

RAT

A

Remote access trojan. Trojan horse that once planted gives remote access to the host

24
Q

Spyware

A

This is a program that once planted communicates data about the user and their activity

25
Q

Bot

A

Semi-autonomous agents running under the control of a remote herder. They are not always malicious

26
Q

Zombie

A

Code or a whole computer running under the control of a remote program

27
Q

Browser hijacker

A

Changes browser settings. Denies access to specific sites or redirects access to other sites

28
Q

Rootkit

A

Code installed on the root or most privileged part of the OS. Difficult to detect

29
Q

Toolkit

A

Contains a set of programs or tests that can be used to identify vulnerabilities. Not dangerous in itself

30
Q

Scareware

A

This is not code, but a false warning of malicious attack

31
Q

Virus countermeasures

A

Use commercial software acquired from established vendors
Test all new software on an isolated computer
Only open attachments if you know them to be safe
Install software and other executable code only when you know them to be safe
Recognise that any website could be infected
Make a recoverable system image and store it safely
Make and retain backups of executable files
Make use of an anti-virus program