Mitigate Software Vulnerabilities and Attacks Flashcards
The processes of planning, analysis, design, implementation, and maintenance
that governs software and systems development
Software Development Life Cycle (SDLC)
A software development model where the phases of the SDLC cascade so that
each phase will start only when all tasks identified in the previous phase are
complete
Waterfall Method
A software development model that focuses on iterative and incremental
development to account for evolving requirements and expectations
Agile Method
Microsoft’s security framework for application
development that supports dynamic development processes
Security Development Life (SDL)
A security analyst receives no privileged information about the software
Black Box Testing (or Blind Testing)
A security analyst receives privileged information about the software, such as the
source code and credentials
A security analyst receives no privileged information about the software
A security analyst receives partial disclosure of information about the software
Gray Box Testing
A charity and community that publishes a number of secure
application development resources
Open Web Application Security Project (OWASP)
A company specializing in cybersecurity and secure web
application development training and sponsors the Global
Information Assurance Certification (GIAC)
SysAdmin, Network, and Security (SANS) Institute
Attacks against software code attempt to allow the execution of the attacker’s code
Execution and Escalation
A vulnerability that allows an attacker to run their own code or a
module that exploits such a vulnerability
Arbitrary Code Execution
A vulnerability that allows an attacker to transmit code from a remote
host for execution on a target host or a module that exploits such a
vulnerability
Remote Code Execution
Occurs when a user accesses or modifies specific resources that they
are not entitled to normally access
Privilege Escalation
A class of malware that modifies system files (often at the kernel level) to conceal
its presence
Rootkit
A kernel mode rootkit is able to gain complete control over the
system
Kernel mode