Secure Software Development Flashcards
Occurs when a tester is not provided with any information about
the system or program prior to conducting the test
Black Box Testing
Occurs when a tester is provided full details of a system including
the source code, diagrams, and user credentials in order to
conduct the test
White Box Testing
Provides control over what the application should do when faced with a
runtime or syntax error
Structured Exception Handling(SEH)
Applications verify that information received from a user matches
a specific format or range of values
Input Validation
Source code of an application is reviewed manually or with automatic
tools without running the code
Static Analysis
§ Analysis and testing of a program occurs while it is being executed or run
Dynamic Analysis
Injection of randomized data into a software program in an attempt to
find system failures, memory leaks, error handling issues, and improper
input validation
Fuzzing
Code placed in computer programs to bypass normal authentication and
other security mechanisms
Backdoors
Method of accessing unauthorized directories by moving through the
directory structure on a remote server
Directory Traversal
Occurs when an attacker is able to execute or run commands
on a victim computer
Arbitrary Code execution
Occurs when an attacker is able to execute or run commands
on a remote computer
Remote Code Execution
Attack against a vulnerability that is unknown to the original developer or
manufacturer
Zero Day
Occurs when a process stores data outside the memory range allocated
by the developer
Buffer Overflow
§ A temporary storage area that a program uses to store data
Buffer
Reserved area of memory where the program saves the return
address when a function call instruction is received
Stack