Chapters 11-14: Application/Cloud/Organizational security and Disaster planning Flashcards
Which application exploit accesses directories on the target machine that regular clients do not?
Directory traversal
What is a type of injection attack which exploits a common XML parser feature. Attackers can use it to steal data or issue commands to other applications through an insecure parser
XML External Entities (XXE)
Which type of attack allows remote code execution on client browsers using client side scripting in web pages. They allow the attacker to gain control of the end user’s browser or login session.
Cross-site scripting (XSS)
Which type of attack occurs when data stored in some storage format like JSON is converted back into its original form and directly used as program input. If the serialized data is under user control, it can be malformed to cause DoS, SQL injection, or remote code execution.
Insecure de-serialization
Which type of operation retrieves an object a pointer is pointing to. May be used on a null pointer to crash an application, bypass a security function, or return useful debug information.
De-referencing
Which error occurs during race conditions when something is changed between when you checked something and used the result of the check?
Time of check to time of use (TOCTOU)
Which attack inserts code into a running process by forcing it to load executable code from a shared library file?
DLL injection
In which XSS technique is the script uploaded to the server?
Stored/Persistent
In which XSS technique is the script placed into a server request?
Reflected/Non-persistent
In which XSS technique does the script never get placed in the server, bu instead takes place entirely in the model browsers use to render content?
Document Object Model (DOM) based
Which attack exploits the site’s trust of the user?
Cross-site request forgery (CSRF or XSRF)
Which attack is like a CSRF, but exploits vulnerabilities in the server?
Server side request forgery (SSRF)
What technique prevents attacks like injection and buffer overflow by validating all input received before processing it?
Input validation
Which technique protects backend databases by adding escape characters so that input resembling code won’t be treated as such?
Input Sanitization
Which cloud service model is subscription-based access to applications or databases. Sometimes referred to as “on-demand software”
Software as a Service (SaaS)
Which cloud service model provides access to a computing platform or software environment the cloud customer (CC) can use to develop and host web-based applications
Platform as a Service (PaaS)
Which cloud service model provides access to computing and networking resources themselves, such as storage devices, processing, entire computers, and even whole networks?
Infrastructure as a Service (IaaS)
Which cloud service model includes storage as a service, information as a service, security as a service and so on?
Anything as a Service (XaaS)
In which cloud deployment model is access to the service available to the general public, for free or for a fee? It can be owned and hosted by any sort of public or private organization.
Public
In which cloud deployment model is the service accessible only to a single organization, though it is shared among multiple divisions or business units. It might be on-premises or off, and it might be owned and managed by the organization itself or a third party.
Private
In which cloud deployment model is the service shared between a group of organizations with shared concerns and needs, for example, organizational mission or specific technical, policy, or security requirements. It may be hosted by one, by a third party, or as a cooperative venture.
Community
The service has some combination of public, private, and community cloud characteristics under one shared hardware or software infrastructure. For example, a provider of public cloud services might also host private clouds for large customers with higher security needs or other specialized requirements.
Hybrid