Chapter 4 - The web - user side Flashcards

1
Q

man-in-the-browser

A

Code inserted into the browser can read, copy, and redistribute anything the user enters in a browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

keystroke logger (or key logger)

A

either hardware or software that records all keystrokes

entered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Page-in-the-middle attack

A

type of browser attack in which a user is redirected

to another page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

download substitution

A

the attacker presents a page with a desirable and seemingly innocuous program for the user to download, What the user does not know is that instead
of or in addition to the intended program, the attacker downloads and installs malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CAPTCHA

an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart

A

puzzle that supposedly only a human can solve, so a server application can distinguish between a human who makes a request and an automated program
generating the same request repeatedly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

phishing

A

an unsuspecting user submits sensitive information

to a malicious system impersonating a trustworthy one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

one-time password

A

only one use. the two end parties need to have a shared secret list of passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Out-of-band communication

A

transferring one fact along a communication path

separate from that of another fact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

website defacement

A

occurs when an attacker replaces or modifies

the content of a legitimate web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

signed code

A

Users can hold downloaded code until they inspect the seal. After verifying that the seal is authentic and covers the entire code file being downloaded, users can install the code obtained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

web bug, also called a clear GIF, 1x1 GIF, or tracking bug

A

a tiny image, as small as 1 pixel by 1 pixel (depending on resolution, screens display at least 100 to 200 pixels per inch), an image so small it will not normally be seen. Nevertheless, it is loaded and processed the same as a larger picture. Part of the processing is to
notify the owner, the advertiser, who thus learns that another user has loaded the advertising image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Clickjacking

A

a technique that essentially causes that prompt box to slide around so that [Yes] is always under the mouse. The attacker also makes this box transparent, so
the victim is unaware of clicking anything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

framing, or using an iframe

A

a structure that can contain all or part of a page, can be placed and moved anywhere on another page, and can be layered on top of or underneath other frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

drive-by download

A

an attack in which code is downloaded, installed, and executed on a computer without the user’s permission and usually without the user’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cross-site scripting

A

executable code is included in the interaction between client and server and executed by the client or server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

persistent cross-site scripting attack.

A

the server interprets and executes the script or saves the script and returns it to other clients (who would then execute the script).

17
Q

SQL injection

A

operates by inserting code into an exchange between

a client and database server.

18
Q

server-side include.

A

The problem takes advantage of the fact that web pages can be organized to invoke a particular function
automatically.

19
Q

spam

A

fictitious or misleading email

20
Q

spear phishing

A

the bait looks especially appealing to the prey

21
Q

S/MIME (Secure Multipurpose

Internet Mail Extensions)

A

the Internet standard for secure email attachments.