Host, Data, and Application Security Flashcards
advanced persistent threats (APTs)
Any sophisticated series of related attacks taking place over an extended period of time
APTs
advanced persistent threats
Agile development
A method of software development where milestones and product release are more incremental
baselining
creating a baseline security level
Big Data
Data that is larger than what can be handled with traditional tools and algorithms
database normalization
The process of removing duplication in a relational database
embedded system
Operating system in a device, sometimes on a single chip
fuzzing
A method of testing that intentionally enters invalid input to see if the application can handle it and look for vulnerabilities
hardening
The process of making a server or an application resistant to an attack
Infrastructure as Code (IaC)
The process of managing and provisioning computer data centers through machine-readable definition files
IaC
Infrastructure as Code
Internet of Things (IoT)
Devices that interact on the Internet, without human intervention
IoT
Internet of Things
NoSQL database
Datastores that do not use a relational structure
Open Web Application Security Project (OWASP)
An online community that develops free articles, tools, etc on web application security
OWASP
Open Web Application Security Project
prototyping
Creating a version of an application that has only the bare minimum functionality so it can be evaluated before further development
sandboxing
Operating in an isolated environment
script kiddy
An attack with minimal technical knowledge; utilizes purchased, premade software
secure coding
Programming in a manner that is secure
stored procedures
SQL statements written and stored on the database that can be called by applications
stress testing
Subjecting a system to workloads that are extreme
Structured Query Language (SQL)
The language used by all relational databases
SQL
Structured Query Language
waterfall method
A software development method that uses very well-defined sequential phases; one big deliverable at the end of a long timeframe
zero-day exploit
A vulnerability that is unknown to the product vendor, and thus there is no patch for it