Data Security Flashcards

1
Q

Types of SQL Injection

A
  1. Query Modification.
  2. Union Attack.
  3. Stacked Queries.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Query Modification

A

The attacker modifies the original query and then Ignores the rest of the original by adding – at the end of their addition to comment it out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Union Attack

A

The attacker creates a UNION with an existing query that returns results from their query mixed with results of a legitimate query.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stacked Queries

A

The attacker ends the original query with a ; and then appends their own query onto the original.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preventing SQL Injection

A
  1. Parameterized Queries.
  2. Input Validation.
  3. Limit Database User Privileges.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Preventing SQL Injection

A
  1. Parameterized Queries.
  2. Input Validation.
  3. Limit Database User Privileges.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Parameterized Queries

A

The single most effective thing you can do to prevent SQL injection is to use parameterized queries. If this is done consistently, SQL injection will not be possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Input Validation

A

Limiting the data that can be input by a user can certainly be helpful in preventing SQL Injection, but is by no means effective prevention by itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Limit Database User Privileges

A

A web application should always use a database user to connect to the database that has as few permissions as necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hash Function

A

Is one that can map input data of arbitrary size to a fixed size output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hashing characteristics

A

Hashing is 1-way, meaning that once data is hashed, the hash cannot be reversed back into the original data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Salt

A

Is a fixed-length cryptographically-strong random value that is added to a password as input to a hash function..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption

A

is the most effective way to achieve data security. When data is sent between two parties or stored, it is stored in an encrypted non-human readable format that requires the key to properly decrypt and understand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encrypting Data at Rest

A
  1. Data at rest can use a form of encryption called symmetric key encryption.
  2. Requires both parties to use the key to encrypt and decrypt data.
  3. Any party possessing the key can read the data.
  4. Has difficulties securing the symmetric key amongst multiple parties.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Securing Data in Transit

A
  1. Data in transit can use a form of encryption called asymmetric key encryption.
  2. Uses a Private and Public Key.
  3. Any party can be sent the public key. It can encrypt the data, but not decrypt it.
  4. Only the key owner has the private key. It can decrypt data encrypted by the public key.
  5. Has difficulties securing the symmetric key amongst multiple parties.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asymmetric Encryption Common Usages

A
  1. Communication/Network Security: Digital Certificates.
  2. Web: HTTPS (SSL (Secure Socket Layer) /TLS (Transport Layer Security) ).
  3. Java: Bouncy Castle.
17
Q

Communication/Network Security Asymmetric Encryption

A

Normally a paid subscription
OpenSSL - Open Source / Free Certificates
http://dashboard.techelevator.com vs https://dashboard.techelevator.com

18
Q

Web Asymmetric Encryption

A

HTTPS Everywhere Project - movement to make all communication on the internet encrypted using OpenSSL.

19
Q

Java Asymmetric Encryption

A

An open-source library that provides asymmetric encryption for Java.

20
Q

Man In The Middle Attack

A

Performed by a local malicious network connection, for example, in a coffee shop or hotel.

21
Q

Man In The Middle Attack characteristics

A
  1. Attacker provides a fake wifi connection.
  2. Victim connects and establishes a secure connection with the fake wifi connection.
  3. The attacker establishes a secure connection on behalf of the victim to the intended destination.
  4. Communication then transmits encrypted from the user to the attacker’s device and from the attacker’s device to the destination but is unencrypted while on the attacker’s device.