Cloud Applications Flashcards

1
Q

Qualitative risk analysis

A

is the process of rating or scoring risk based on a person’s perception of the severity and likelihood of its consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Quantitative risk analysis

A

is the process of calculating risk based on data gathered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the S.T.R.I.D.E threat model?

A

Spoofing Identity, Tampering with data, Repudiation, Information Disclosure, Denial of Service, Elevation of privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spoofing Identity

A

illegally accessing and then using another user’s authentication information, such as username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tampering with data

A

involves the malicious modification of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Repudiation

A

users who deny performing an action without other parties having any way to prove otherwise—for example, a user performs an illegal operation in a system that lacks the ability to trace the prohibited operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information disclosure

A

the exposure of information to individuals who are not supposed to have access to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Elevation of privilege

A

an unprivileged user gains privileged access and thereby has sufficient access to compromise or destroy the entire system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

D.R.E.A.D (Risk Assessment Model)

A

Damage, Reproducibility, Exploitability, Affected users, Discoverability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is D.R.E.A.D?

A

is part of a system for risk-assessing computer security threats previously used at Microsoft and although currently used by OpenStack and other corporations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is PTA?

A

PTA (Practical Threat Analysis) is a risk assessment methodology and a suite of software tools that enable users to find the most beneficial and cost-effective way to secure systems and applications according to their specific functionality and environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rapid Application Development

A

is a form of agile softwaredevelopmentmethodology that prioritizesrapidprototype releases and iterations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Systems Development Life Cycle (SecSDLC)

A

a methodology for the design and implementation of an information system in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OpenID

A

it allows users to be authenticated by co-operating sites using a third-party service, eliminating the need for webmasters to provide their own ad hoc login systems, and allowing users to log into multiple unrelated websites without having to have a separate identity and password for each

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OAuth

A

is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WS-Federation (Web Services Federation)

A

is an Identity Federation specification, developed by a group of companies: BEA Systems, BMC Software, CA Inc. (along with Layer 7 Technologies now a part of CA Inc.), IBM, Microsoft, Novell, HP Enterprise, and VeriSign.

17
Q

web application firewall (WAF)

A

is an application firewall for HTTP applications. It applies a set of rules to an HTTP conversation.

18
Q

XML appliance

A

is a special-purpose network device used to secure, manage and mediate XML traffic

19
Q

Tokenization

A

is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value.

20
Q

Data masking

A

is the process of hiding original data with modified content (characters or other data.)

21
Q

SQL injection

A

is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

22
Q

Weak Authentication

A

Weak authentication has many facets, ranging from brute forcing of the user interface to insecure storage of the database credentials used by an application.

23
Q

Privilege abuse

A

Users may abuse legitimate data access privileges for unauthorized purposes

24
Q

Excessive privileges

A

If users hold privileges that exceed the requirements of their job function, these privileges may be abused by the individual or an attacker who compromises their account.

25
Q

Inadequate logging and weak auditing

A

Logging and auditing are key to deterring and detecting misuse and enabling adequate investigation of suspected data compromise.

26
Q

Denial of service

A

attacks from the internet, can overwhelm your system regardless of the capacity of its internet connection

27
Q

Exploiting unpatched services

A

While up-to-date patching won’t make you secure, operating vulnerable unpatched services will significantly increase the likelihood of being compromised.

28
Q

Inference Attack

A

is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database.

29
Q

Directory Traversal attack

A

is an HTTP attack that allows attackers to access restricted directories and execute commands outside of the web server’s root directory.

30
Q

Cross-site scripting

A

attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites