Chapter 9 - Client And Application Securiity Flashcards

1
Q

BIOS (Basic Input/Output System)

A

Firmware that wakens and tests the various components of the computer upon startup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

UEFI (Unified Extensible Firmware Interface)

A

A newer mechanism that replaces the BIOS for startup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure boot

A

A standard designed to be used with UEFI to ensure that a computer boots using only software that is trusted by the computer manufacturer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware root of trust

A

The hardware starting point in a chain of trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Electromagnetic spying

A

Picking up on the electromagnetic fields that digital devices produce and reading the data that is producing them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Telecommunications Electronics Material Protected from Emanating Spurious Transmissions (TEMPEST)

A

A classified standard intended to prevent attackers from picking up electromagnetic fields from government buildings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Supply chain

A

A network that moves a product from the supplier to the customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Least functionality

A

A principle in which a user is given the minimum set of permissions required to perform necessary tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application whitelisting/blacklisting

A

Creating a list of applications that are permitted (whitelisting) or denied (blacklisting) to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Patch

A

A publicly released software security update intended to repair a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Antivirus (AV)

A

Software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trusted OS

A

An operating system that has been designed through OS hardening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Deadbolt lock

A

A door lock that extends a solid metal bar into the door frame for extra security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key management

A

Procedures to regulate the distribution of door keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access logs

A

A paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mantrap

A

A device that monitors and controls two interlocking doors to a small room, designed to separate secure and nonsecure areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Protected distribution system (PDS)

A

A system of cable conduits that is used to protect classified information being transmitted between two secure areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Memory leak

A

A vulnerability that occurs when an application dynamically allocates memory but does not free that memory when finished using it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Pointer deference

A

A pointer with a value of NULL used as if it pointed to a valid memory area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DLL injection

A

An attack that inserts code into a running process through a Dynamic Link Library.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Development stage

A

A stage of application development in which the requirements for the application are established and it is confirmed that the application meets the intended business needs before the actual coding begins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Testing stage

A

A stage in which an application is tested for any errors that could result in a security vulnerability.

23
Q

Staging stage

A

A stage in application development that performs a quality assurance test to verify that the code functions as intended.

24
Q

Production stage

A

An application development stage in which the application is released to be used in its actual setting.

25
Q

Application development lifecycle model

A

A conceptual model that describes the different stages involved in creating an application.

26
Q

Waterfall model

A

An application development lifecycle model that uses a sequential design process.

27
Q

Agile model

A

An application development lifecycle model that follows an incremental approach.

28
Q

Secure DevOps

A

A specific type of software methodology that follows the agile model and heavily incorporates security concepts.

29
Q

Security automation

A

Tools that test for vulnerabilities.

30
Q

Continuous integration

A

Ensuring that security features are incorporated at each stage of application development.

31
Q

Immutable systems

A

Ensuring that once a vale or configuration is employed as part of an application, it is not modified.

32
Q

Infrastructure as code

A

Managing a hardware and software infrastructure using the same
Principles as developing computer code.

33
Q

Baselining

A

Creating a starting point for comparison purposes to apply targets and goals to measure success.

34
Q

Provisioning

A

The enterprise-wide configuration, deployment, and management of multiple types of air system resources.

35
Q

Deprovisioning

A

Removing a resource that is no longer needed.

36
Q

Change management

A

A methodology for making modifications to a system and keeping track of those changes.

37
Q

Version control

A

Software that allows changes to be automatically recorded and if necessary “rolled back” to a previous version of the software.

38
Q

Data exposure

A

Disclosing sensitive data to attackers.

39
Q

Proper error handling

***(secure coding techniques—->)

A

Taking the correct steps when an error occurs so that the application does not abort unexpectedly.

40
Q

Proper input validation

A

Accounting for errors such as incorrect user input.

41
Q

Normalization

A

Organizing data within a database to minimize redundancy.

42
Q

Stored procedure

A

A subroutine available to applications that access a relational database.

43
Q

Code signing

A

Digitally signing applications.

44
Q

Obfuscation/camouflaged code

A

Writing an application in such a way that it’s inner functionality is difficult for an outsider to understand.

45
Q

Dead code

A

A section of an application that executes but performs no meaningful function.

46
Q

Model verification

A

A test used to ensure that the projected application meets all specifications at that point.

47
Q

Compiled code testing

A

Searching for errors that could prevent an application from properly compiling from source code to application code.

48
Q

Runtime code testing

A

Looking for errors after the program has compiled correctly and is running, such as a pointer deference or memory leak.

49
Q

Sandbox

A

A testing environment that isolates untested code from the live production environment.

50
Q

Static program analyzers

A

Tools that examine software without actually executing the program; instead, the source code is reviewed and analyzed.

51
Q

Dynamic analysis (fuzzing)

A

Software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.

52
Q

Stress testing

A

Putting an application under a heavier than norma load to determine if the program is robust and can perform all error handling correctly.

53
Q

Integrity measurement

A

An “attestation mechanism” designed to ensure that an application is running only known and approved executables.