Revision Flashcards

1
Q

5 factors that have exacerbated security issues surrounding web apps

A
  1. user error
  2. phishing
  3. lack of multi factor authentication
  4. recycling of passwords between applications
  5. careless configuration by sys admin / developers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Draw 7 layer OSI Model

A
  • Application Layer
  • Presentation Layer
  • Session
  • Transport
  • Network
  • Data link later
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 new OSI layer models?

A
  • Government
  • Organisation
  • User
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What 4 parts does a HTTP request contain?

A
  1. Request line
  2. Several Headers
  3. Optional body message
  4. A mandatory blank line

Server type is exposed in the header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HTTP is what type of protocol?

A
  • message based
  • statelesss
  • operates by sending a message to the server
  • receives a response in return
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List 6 other HTTP requests

A
  1. HEAD
  2. OPTION
  3. PUT
  4. TRACK
  5. TRACE
  6. DELETE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List 2 main types of HTTP request

A
  1. GET
  2. POST
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the first line of a HTTP request comprise of?

A
  • request method: GET or POST
  • required resource: HTTP version (HTTP/1.0 or HTTP/1.1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Headers are on lines 2 - 4 of a GET request. What do they inform the server of?

A
  • methods of encoding
  • compression
  • content types supports by the client
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

User agent header is used for what 2?

A
  • by the client browser to identify itself to the application
  • differentiate between desktop and mobile devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is line 6 used for in HTTP Get ?

A
  • Host header
  • used to identfiy which server the client is attempting to access
  • 1 server can host multiple websites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Connection header Line 7 of the HTTP request is used for what?

A

instructs the web server to either keep connection alive or close after current transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Line 8 is used for what

A

cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

line 9 is used for what?

A
  • mandatory blank line
  • cr lf
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does SQL injection occur?

A
  • from a lack of encoding/escaping of user-controlled input
  • when included in SQL queries.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SQL injection?

A
  • a web security vulnerability
  • allows an attacker to interfere with queries
  • allows an attacker to view data they shouldnt
  • attack can modifiy data belonging to another user
17
Q
A
18
Q

When do you perform threat modelling?

A

a change in the system architecture

after a security incident

new vulnerabliltes a discovered

when the architecture is ready

19
Q

Why do we threat model?

A
  • find security flaws when there is time to fix them
  • save time, revenue, reputation
  • build a secure app
  • bridge gap between devs and sec
  • documents threats
  • knowledge & awareness of risks and vulnerablities