IS3445 CHAP 6 MITIGATING WEB SITE RISKS, THREATS, AND VULNERABILITIES Flashcards
___ is a protocol primarily responsible for the authentication and integrity verification of data packets.
(AH) Authentication Header
___ is the result when an attacker compromises authentication credentials, gaining access to all resources associated with those credentials.
Broken authentication
___ exploits the trust a Web site has for a user’s browser. This can occur because once a visitor is authenticated and logged onto a particular Web site, that site trusts all requests that come from the browser.
(CSRF) Cross-site request forgery attack
___ is a protocol that provides encryption services to network data. It can also be used for authentication and integrity services. This differs from AH authentication in the this protocol includes only the header, trailer, and payload portions of a data packet.
(ESP) Encapsulating Security Payload
___ occurs when an attacker browses unprotected areas and data on a Web server. This attack is enabled by Web applications that fail to restrict vulnerabilities.
Failure to restrict URL access attack
___ is the exploitation by an attacker of information found or gathered which was intended only for authorized users.
Information leakage
___ enables an attacker to bypass an application’s access controls and create, change, delete, or read any data the application can access.
Injection flaw attack
___ is the verification of all data that is received. This helps prevent malicious data from entering an application. This is a form of filtering in which unexpected or unwanted input is automatically rejected and the underlying database remains inaccessible.
Input validation
___ is a threat that occurs when an administrator fails to secure directories and folders in a Web server. It enables an attacker to traverse through a Web server’s directories, leading to the access of sensitive resources and information leakage.
Insecure direct object reference vulnerability
___ is an organization that researches and publishes known security threats to Web applications and Web services.
(OSWAP) Open Web Application Security Project
___ uses social engineering to initiate an XSS attack. This uses a malicious script that is embedded in a URL link to target a single victim.
Reflected XSS attack
___ is the standard security technology for establishing an encrypted link between a Web server and a Web browser. This link ensures that all data passed between the Web server and browsers remains private and intact.
(SSL) Secure Sockets Layer
___ is a security agreement between two systems on a network that enables the secure exchange of data.
(SA) Security association
___ is the tracking of requests and communications between a Web server and a user. Because HTML is “stateless” by design, Web applications and Web sites must create a session to pass information and authentication from page to page.
Session
___ is a type of attack designed to break through database security and access the information.
SQL injection attack