Chapter 7: Host, Data. and Application Security Flashcards
Any sophisticated series of related attacks taking place over an extended period of time.
Advanced Persistent Threats (APTs)
A method of software development meant to be rapid.
Agile development
Creating a fundamental, or baseline, security level.
Baselining
Data that is larger than what can be handled with traditional tools and algorithms.
Big Data
The process of removing duplication in a relational database.
Database Normalization
Operating system in a device, sometimes on a single chip.
Embedded System
A method of testing that intentionally enters invalid input to see if the application can handle it.
Fuzzing
The process of making a server or an application resistant to an attack.
Hardening
The process of managing and provisioning computer datacenters through machine-readable definition files.
Infrastructure as Code (IaC)
Devices that interact on the Internet, without human intervention.
Internet of Things (IoT)
Datastores that do not use a relational structure.
NoSQL Database
An online community that develops free articles, documentation, tools, and more on web application security.
Open Web Application Security Project (OWASP)
Creating a version of an application that has only the bare minimum functionality so that it can be evaluated before further development.
Prototyping
Operating in an isolated environment.
Sandboxing
An attacker with very minimal skills.
Script Kiddies