Section 11: Managing Application Security Flashcards

1
Q

Name three types of mobile device connection methods.

A
  1. Cellular
  2. Wireless
  3. Bluetooth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an embedded electronic system? Give two examples.

A

Have software embedded into the hardware; some use SoC

Examples: microwaves, gaming consoles, security cameras, wearable technology, smart TVs, medical devices (like defibrillators), self-driving cars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a SCADA system?

A

Industrial control systems used in the refining of uranium, oil, gas, or the purification of water.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What category of devices are smart TV and wearable technology?

A

IoT devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is home automation?

A

Where you can control the temperature, lighting, entertainment system, alarm system, and appliances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is he purpose of SoC?

A

A low-power integrated chip that integrates all components of a computer or electronic system. Example would be a controller for a defibrillator, i.e. an operating system stored on a small chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If a process does not suffer buffer overflow but fails within a specified period of time, which causes the process to fail, what method are you using?

A

The Real Time Operating System (RTOS) processes data as it comes in without any buffer delays. The process will fail if it is not carried out within a certain period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the most likely way an attacker would gain control of an MFP?

A

An attacker would most likely gain control of a multifunction printer (MFP) through its network interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of the security team controlling the HVAC in a data center?

A

To ensure that the temperature is regulated and the servers remain available. They also know which rooms are occupied based on the use of air conditioning and electricity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Someone at work has suffered a cardiac arrest and the first aid delegate takes out a defibrillator that gives instructions of the steps to take. What had been build into the device to give these instructions?

A

A SoC, which gives instructions on the steps to take. However, if it detects a pulse, it will send a charge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give an example of embedded systems that can be used with vehicles?

A

Self-parking or self-driving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a UAV? Give two examples.

A

Unmanned aerial vehicles (UAVs) are drones or small aircraft that can be sent to areas where manned aircraft cannot go. They can be fitted with a camera to record events or take aerial photographs.

Examples: tracking the spread of forest fire, police surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the main problem with a race condition when using an application?

A

A race condition is when two threads of an application access the same data at the same time. Access should be sequential lest it lead to data corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the perfect way to set up error handling in an IT system?

A

Grant the user generic information only, but for the log files (accessed by the admin) to include a full description of the error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain input validation and name three types of attacks that this could prevent.

A

Ensures that data is inserted into an application in the correct format. Any data in the incorrect format will be rejected.

Examples of attacks this could prevent:
1. SQL injection
2. Buffer overflow
3. Integer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you prevent a SQL injection attack other than with input validation?

A

Stored procedures.

17
Q

What is the purpose of code signing?

A

Similar to digital signatures, code signing confirms that the code is the authentic original code and that it has not been tampered with.

18
Q

What is the purpose of obfuscation?

A

Taking code and masking the data, making it obscure so that, if it is stolen, it will not be understood.

XOR and ROT13 could be used for obfuscation. Steganography could be used to hide the code.

19
Q

What is dead code and how should it be treated?

A

Redundant code that is no longer used but could still introduce errors into the program life cycle. It should be removed.

20
Q

If you are an Android developer, what can you obtain from the internet to help you get an application to market quickly?

A

Code, using a third-party library from the internet.

21
Q

What is the purpose of a measured boot?

A

Logs information about the firmware and application and stores this log in the TPM chips. This can be used to check the health status of the host and complete an anti-malware check during the boot process that confirms that the software is trustworthy.

22
Q

What is needed for a secure boot - UEFI or BIOS?

A

UEFI, which is a modern version of the BIOS.

23
Q

If BitLocker is checking upon boot up that the software has not been tampered with, what is this known as?

A

Attestation.

24
Q

What is the purpose of an endpoint detection and response solution?

A

Centralized console that continuously monitors the computer and makes automatic alerts when a threat has been detected. Uses machine learning.

25
Q

Why do we use fingerprinting?

A

Fingerprinting is the deep analysis of a host, looking at the applications, software version, and the services that are running. Tools such as nmap and netcat can be used for this.

26
Q

What type of firewall can act as an intrusion prevention device, a stateful firewall, and can inspect encrypted SSL and HTTPS packets?

A

A Next Generation Firewall (NGFW), carries out deep packet filtering.

27
Q

Why is tokenization deemed more secure than encryption?

A

Tokenization takes sensitive data, like a credit card number, and replaces it with random data so it cannot be reversed. The data is held by a payment provider in a remote location who then replaces the data with a token.

28
Q

What is the purpose of secure cookies?

A

We can set the secure flag on the website to ensure that cookies are only downloaded when there is a secure HTTPS session.

29
Q

What is the purpose of using HSTS?

A

HTTP Strict Transport Security (HSTS) ensure that the web browser only accepts secure connections and prevents XSS.

30
Q

When a developer wants to analyze code when it is running, what type of code analyzer will they use?

A

Dynamic code analysis so that they can use fuzzing to test the code.

31
Q

What is the benefit of using the Docker tool to protect your registry?

A

Allows you to isolate applications into a separate space called containers. The registry can now be isolated in a separate container, making it more secure.

32
Q

Why would a cybersecurity team change the SSD hard drives in the company’s laptop to an Opal drive?

A

Opal is a self-encrypting drive where the encryption keys are stored on the hard drive controller and are therefore immune to a cold boot attack and are compatible with all operating systems.

They do not have the vulnerabilities of software-based encryption. As a hardware solution, they outperform software solutions. Only the user and the vendor can decrypt the drive.

33
Q

As part of application development, when would you apply quality assurance?

A

QA is completed during the staging environment where users test the new application with real data.