Chapter 5 : Application Security Flashcards

1
Q

Securing Web Browsers

A
  • Avoid newest versions and disable auto update (new versions are unstable)
    • Consider organizational requirements and OS
    • General Browser Security Procedures
      > Implement Policies
      Hand written, browser settings, GPO(Windows), OS setting etc
      > Train Users
      > Use proxy and content filter
      Proxy serves as an intermediate cache between server and client
      Configured in browser settings / domain controller
      Beware of malicious proxy configurations
      > Secure against malicious code
      Configure Java, ActiveX, Javascript, Flash media etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Web Browser Concerns and Security Methods
A
Basic Methods
			> Timely Updates
			> Adblock, pop up blocking
			> Implement security zones
			> Control ActiveX/Java/Plugins
			> Avoid jailbreaking (mobile)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you secure Cookies?

A

> Configure and control through browser settings

> Related threat : Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Securing LSO(Locally Shared Objects - Flash)

A

> Flash version of cookies, may be used to track users

> Configure and control in Flash Player Settings Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Securing Addons / Plugins

A

> Inherent security risk, disable all

> Most IE plugins made with vulnerable ActiveX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advanced Browser Security

A

> Browser temp files – configure to automatically flush
> Disable saved passwords
> Configure a minimum version limit on TLS/SSL
> Disable all 3rd party plugins
> Consider using a VPN or virtual machine for extra separation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Principle of Least Functionality

A

don’t give tools users don’t need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

User Account Control (Windows)

A
  • Keeps everyone on regular user level of access by default

- Prompts required to access any admin right required things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Securing common Windows programs 1. Outlook

A

> Install latest update, upgrade to newer version of Office
> Use email whitelisting to remove junk email
> Read email in text format instead of HTML
> Enable attachment blocking
> Use encryption - SPA (Secure Password Authentication), PGP, SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Securing common Windows programs 2. Word

A

> Using passwords for opening/modifying documents
> Read only settings
> Digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Securing common Windows programs 3. Excel

A

> Password protected worksheets, no macro

> Excel encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile Applications

A
  • Disable GPS

- Configure strong passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Server Applications - e.g. FTP, Email, Web, SQL database

A
  • Change default username / passwords

- Don’t consolidate multiple services into single machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SDLC

A

(Software Development Life Cycle)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SDLC- Waterfall

A

> Traditional method

> Requirements are decided before development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SDLC- Agile

A

> RAD (Rapid Application Development) approach
> Relatively new, Breaks development down to incremental changes
> Requires high dedication from members

17
Q

SDLC- DevOps

A

> Deployment tool, often used together with Agile method

18
Q
  • Secure code review
A

> In depth code review for security bugs

> Included before fuzzing or penetration testing

19
Q
  • Threat Modeling
A

> Identifying and prioritizing potential threats

20
Q
  • Common Security Principles
A
  1. Least Privilege
    2. Defense in Depth
    3. Never trust user input
    4. Minimizing attack surface
    5. Secure defaults
    6. Provide authenticity and integrity (program signatures)
    7. Fail securely (Error handling)
    8. Thorough testing of security fixes and patches
21
Q

White box vs Black box testing

A

> white box, black box, gray box, stress testing, pentesting etc

22
Q

Compile time vs runtime errors

A

> Reminder that both software and hardware has runtime errors
> SHE (Structured Exception Handling) deals with both SW/HW

23
Q

Static vs Dynamic code analysis

A

> Static : No code execution, examines code with automated tools
> Dynamic : Runtime examination of code behavior for bugs
* Fuzzing is a form of dynamic code analysis

24
Q

Arbitrary and Remote Code Execution

A

> Shellcode injections

> Strong input validation, fuzz testing