Security Flashcards

1
Q

What is the Principle of Least Privilege?

A

The Principle of Least Privilege is when users are only given the minimum levels of permissions necessary to perform the intended function. Enforced by the Operating System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What kind of Permissions does Windows have?

A

Windows has granular permissions. Allow and deny separately/explicitly. Has “Full Control” option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Buffer Overflow?

A

Buffer Overflows occur when a process attempts to write data outside the bounds of the buffer. The result is data is written into an area used for some other purpose resulting in the corruption of that memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Buffer Overflow attack?

A

A Buffer Overflow attack is when a program is exploited to access the memory space beyond the buffer, causing it to overwrite adjacent memory locations. It can cause program crashes or execute Arbitrary Code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Buffer?

A

A Buffer is a temporary area where data is stored in the main memory (RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Arbitrary Code Execution?

A

Arbitrary Code Execution is an attacker’s ability to run any commands or code of the attacker’s choice on a target machine or in a target process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can Arbitrary Code Execution do?

A

Arbitrary Code Execution can install any code the attacker wants on your computer/phone/smart AI powered toothbrush. It can activate camera, remotely control the device, snoop on emails, steal passwords, credit card details, it can perform privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Buffer Overread?

A

The opposite of Buffer Overflow. A Buffer Overread occurs during a read operation. When reading from a buffer, the program goes over the buffer boundary and reads adjacent memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are SQL Injections?

A

An SQL Injection is a common attack that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed, such as sensitive company data, user lists or private customer details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does rooting/jailbreaking a phone do?

A

Allow privilege escalation, effectively making user a supervisor. It bypasses the file system and OS protections put in place by the device, meaning malicious applications could read and manipulate any data on the device. Changes basic security model of the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly