Midterm - CH 1,3,4,5,6,7, 10, 11, 12 Flashcards
Defensive or Secure Programming
the process of designing and implementing software so that it continues to function even when under attack
injection attack
wide variety of program flaws related to invalid handling of input data
This problem occurs when program input data can accidentally or deliberately influence the flow of execution of the program
command injection
the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server
SQL injection
The user-supplied input is used to construct a SQL request to retrieve information from a database
code injection
the input includes code that is then executed by the attacked system
cross-site scripting (XSS) attacks
concerns input provided to a program by one user that is subsequently output to another user.
XSS reflection vulnerability
The attacker includes the malicious script content in data supplied to a site
Malware propagation mechanisms include those used by…(3)
viruses, worms and Trojans
The principal objectives of computer security are to
prevent unauthorized users from gaining access to resources,
to prevent legitimate users from accessing resources in an unauthorized manner,
and to enable legitimate users to access resources in an authorized manner
A consequence of a buffer overflow error is
corruption data used by the program,
unexpected transfer of control in the program,
possible memory access violation
To defend against database inference attacks we can apply
perturbation, de-identification, anonymization
Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the
verification step
‘No write down’ is also referred to as the
‘*-property’
_____ is a process that ensures a system is developed and operated as intended by the system’s security policy
Assurance
____ data are data that may be derived from corporate data but that cannot be used to discover the corporation’s identity
Sanitized
Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the
verification step
The most important changes needed to improve system security are to ____
disable remotely accessible services that are not required,
ensure that applications and services that are needed are appropriately configured,
disable services and applications that are not required
The following steps should be used to secure an OS:
test the security of the basic OS,
remove unnecessary services,
install and patch the OS
form of buffer overflow attack
heap overflows, return to system call, replacement stack frame
a set of automated tools designed to detect unauthorized access to a host system
intrusion detection system (IDS)
A multilevel secure system for confidentiality must enforce:
No read up: A subject can only read an object of less or equal security level. This is referred to in the literature as the simple security property (ss-property).
No write down: A subject can only write into an object of greater or equal security level. This is referred to in the literature as the *-property1 (pronounced star property).
_____ will integrate with the operating system of a host computer and monitor program behavior in real-time for malicious action
behavior blocking software
intrusion management encompasses
intrusion detection, prevention and response
Which of the following need to be taken into consideration during the system security planning process
how users are authenticated, the categories of users of the system, what access the system has to information
packet with a spoofed source address for the target system to intermediaries. They
differ in generating multiple response packets for each original packet sent. This can
be achieved by directing the original request to the broadcast address for some network.
the address of a standard library function is chosen, such as the system() function. The attacker specifies an overflow that fills the buffer, replaces the saved
frame pointer with a suitable address, replaces the return address with the address of the desired library function, writes a placeholder value that the library function will believe is a return address, and then writes the values of one (or more) parameters to this library function.