Development Lifecycle & Security Requirements Flashcards

1
Q

STRIDE

A

Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spoofing

A

Pretending to be something or someone other than yourself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tampering

A

Modifying something on disk, on a network, or in memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Repudiation

A

Claiming that you didn’t do something, or were not responsible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information Disclosure

A

Providing information to someone not authorized to see it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial of Service

A

Absorbing resources needed to provide service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Elevation of Privilege

A

Allowing someone to do something they’re not authorized to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Defense in depth

A

If they break into this, they can’t get any farther.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Least privilege

A

Every user or module is given the least amount of privilege it
needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fail securely

A

Take care of exceptions properly! To prevent error message info leak and putting the system on a weird state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security by obscurity

A

Don’t rely on obscurity as security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Detect and Record

A

Useful for post-mortem analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dont trust [input | environment | dependencies | *]

A

Know what, whom and how to trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

KISS

A

Keep It Simple Stupid to minimize attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should use cases include?

A

Actors, preconditions, main flow of primary scenario, alternative scenarios and how the system reacts to use cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Misuse vs Abuse Cases

A

Misuse is unintentional but still security related.

Abuse is intentional and implies the actor is actively looking for vulnerabilities.