Chapter 3 Flashcards
Acronym for API
Application Programming Interface
DLL
Dynamic Link Library
DOM
Document Object Model
LDAP
Lightweight Directory Access Protocol
RPC
Remote Procedure Call
SAM
Windows Security Account Manager
SQL
Structured Query Language
SSL
Secure Socket Layer
TLS
Transport Layer Security
TOC/TOU
Time of Check / Time of Use
XML
Extensible Markup Language
XSRF
Cross Site Request Forgery
XSS
Cross Site Scripting
Most Cyber attacks begin at a ___ level associated with an ordinary user
Ordinary User
Problem with weak validation?
1 cause behind most overflows, injection attacks and canonical structure errors
Resource Exhaustion?
A state where a system doesn’t have the resources it needs to continue to function.
Why did Microsoft reduce the number of processes and services that run in elevated mode in its operating systems?
Blocking privilege escalation is an important defensive step in a system.
What is a memory leak?
When a program doesn’t dump it’s unused memory
Another name for input validation?
Input Handling