IS3445 CHAP 9 MITIGATING WEB APPLICATION VULNERABILITIES Flashcards
___ is a standard that enables communication between Web forms and your program.
(CGI) Common Gateway Interface
___ is a scripting programming language, most commonly used to add interactive features to Web pages.
JavaScript
___ is a strategy for separating programs and running them in their own virtual space.
Sandbox
___ is the exploitation of a vial computer session to gain unauthorized access to information and services within the targeted computer.
Session hijacking
___ is the mechanisms used to track and control changes in software.
(SCM) Software configuration management
___ is a software program containing computer scripts that interact with the end user. Ex: Web mail, shopping carts, portals, games etc.
Web application
- Before integrating a Web application, a designer must be aware of the associated risks and measures to mitigate those risks.
TRUE OR FALSE
TRUE
- Which of the following are primary components of a Web application? (Select two)
- Web server
- Application server
- Client browser
- Database
Web server
Application server
Database
- When a secure Web application is designed, the only aspect that can be manipulated is private access areas.
TRUE OR FALSE.
FALSE.
- A security policy may contain which of the following elements?
- Secure coding procedures
- Access control mechanisms
- Non-compliance consequences
- All the above
- 2 & 3 only
Access control mechanisms
Non-compliance consequences
- You are part of a programming team developing a Web application. Your manager has implemented tracking mechanisms to ensure all developers work on the application within the same guidelines. What has your manager implemented?
- Acceptable use policy
- Application-based access control
- SCM
- Correct usage policy
SCM
- A malicious user has gained access to the administrator’s account and increased the user’s account status. This is an example of ___>
Elevation of privilege
- Session management defines how systems handle and mange user sessions.
TRUE OR FALSE
TRUE
- ___ can occur within a Web application when a user’s authentication token is intercepted by the attackers and used to bypass the authentication controls of the application.
Session replay
- Which of the following are fundamental aspects of the JavaScript secure coding standard? (Select two)
- Duplicate code for redundancy
- Restrict privileges
- Establish trust boundaries
- Use Dynamic SQL
Restrict privileges
Establish trust boundaries