Part 2: W12-1 System Testing Security Flashcards

1
Q

What purpose does security architecture have?

A

Outlines where security mechanisms (ie. authentication, encryption, backup) should be positioned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the steps of threat modeling?

A
  1. Identify asset with security quality requirement
  2. Create architecture overview
  3. Decompose application
  4. Identify threats
  5. Rank threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some examples of security testing mechanisms?

A
  1. Vulnerability scanning
  2. Penetration testing
  3. Password cracking
  4. Ethical hacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name five (5) examples of software security vulnerabilities?

A
  • buffer overflows
  • heap overflows
  • format string vulnerabilities
  • Cross-site scripting (XSS)
  • SQL injection
  • Cross Site Request Forgery (XSRF)
  • Cross Site Script Inclusion (XSSI)
  • Path Traversal
  • Denial of Service
  • Configuration Vulnerabilities
  • AJAX vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a buffer overflow attack work?

A
  1. Inject malware code through input

2. Overflow buffer so program jumps to attack code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a SQL injection attack work?

A

Attacker accesses database through input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a DoS attack work?

A

Server is overloaded so that it cannot service ordinary requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name 4 types of malware and how they work

A

Viruses - self replicating, requires user intervention to replicate

Worms - malware spreads through internet, does not need human intervention,
can spread through email

Trojan horses - useful program with hidden malware

Backdoors - malware that creates covert access channel for attacker, may be embedded in actual programs

Mobile code - designed to look like browsing website

Adware - forces unsolicited advertising

Sticky software - prevents user from uninstalling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Robustness testing what do availability tests check?

A

System’s ability to quickly recover from failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In Robustness testing what do degraded tests check?

A

System’s ability to remain operational after a portion of system fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In Robustness testing what do Power cycling tests check?

A

System’s recovery after power is restored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly