Comp Security- Week 7 Flashcards

1
Q

Typical properties of spoof sites:

A

Show logos from honest site
Suspicious urls
Ask for user input
html copied from honest site (f12)
short lived

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What makes a site trusted?

A

Certificate of authority that is recognized by the browser in the uae it’s CERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SQL injection? What do hackers use it for?

A

The process of adding SQL statements in user input
Used by hackers to:
Probe databases
Bypass authorization
Execute multiple sql statements
Call built in stored procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When does sql injection occur?

A

When developers dynamically build sql statements by using user input which then lets hacker add their own commands via user input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is drop more harmful than delete

A

drop; drops an entire table
delete; deletes a record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does ‘ or 1=1 – do

A

1=1 make statement true
– cause rest of line to be ignored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do attackers know?

A

Insider info
Trial and error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to prevent?

A

Data validation strategies and all methods must check data type, syntax, length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly