Section 11: Managing Application Security Flashcards
Name three types of mobile device connection methods.
- Cellular
- Wireless
- Bluetooth
What is an embedded electronic system? Give two examples.
Have software embedded into the hardware; some use SoC
Examples: microwaves, gaming consoles, security cameras, wearable technology, smart TVs, medical devices (like defibrillators), self-driving cars
What is the purpose of a SCADA system?
Industrial control systems used in the refining of uranium, oil, gas, or the purification of water.
What category of devices are smart TV and wearable technology?
IoT devices.
What is home automation?
Where you can control the temperature, lighting, entertainment system, alarm system, and appliances.
What is he purpose of SoC?
A low-power integrated chip that integrates all components of a computer or electronic system. Example would be a controller for a defibrillator, i.e. an operating system stored on a small chip.
If a process does not suffer buffer overflow but fails within a specified period of time, which causes the process to fail, what method are you using?
The Real Time Operating System (RTOS) processes data as it comes in without any buffer delays. The process will fail if it is not carried out within a certain period of time.
What is the most likely way an attacker would gain control of an MFP?
An attacker would most likely gain control of a multifunction printer (MFP) through its network interface.
What is the purpose of the security team controlling the HVAC in a data center?
To ensure that the temperature is regulated and the servers remain available. They also know which rooms are occupied based on the use of air conditioning and electricity.
Someone at work has suffered a cardiac arrest and the first aid delegate takes out a defibrillator that gives instructions of the steps to take. What had been build into the device to give these instructions?
A SoC, which gives instructions on the steps to take. However, if it detects a pulse, it will send a charge.
Give an example of embedded systems that can be used with vehicles?
Self-parking or self-driving.
What is a UAV? Give two examples.
Unmanned aerial vehicles (UAVs) are drones or small aircraft that can be sent to areas where manned aircraft cannot go. They can be fitted with a camera to record events or take aerial photographs.
Examples: tracking the spread of forest fire, police surveillance
What is the main problem with a race condition when using an application?
A race condition is when two threads of an application access the same data at the same time. Access should be sequential lest it lead to data corruption.
What is the perfect way to set up error handling in an IT system?
Grant the user generic information only, but for the log files (accessed by the admin) to include a full description of the error.
Explain input validation and name three types of attacks that this could prevent.
Ensures that data is inserted into an application in the correct format. Any data in the incorrect format will be rejected.
Examples of attacks this could prevent:
1. SQL injection
2. Buffer overflow
3. Integer overflow