Security Flashcards
Why is it important?
Clients expect it
Service providers require risks to be handled with care
Confidentiality attacks
Interception of data
Make sure info transmitted is only visible to authorised parties
Encrypt
Integrity attacks
Data is changed
Digital signatures
Encryption
Authenticity attacks
Can't replay old messages Impersonation Unsecured URLs Counterfeit objects put into system Web spoofing - webpage that looks exactly the same as another webpage (two factor authentication as solution) Encryption
What is web spoofing?
webpage that looks exactly the same as another webpage
Type of authenticity attack
Availability attacks
Cutting communication lines Destroying servers Interrupting data Disable file management system Denial of service attacks Governments block (eg. DOS attacks)
What is a solution to web spoofing?
Two factor authentication
Explain TFA
Two factor authentication. Uses username and password
Top 10 Security Threats according to OWASP
1) SQL injection: instead of typing in name of user, user types in SQL command
2) Broken Authentication and Session Management: if using public computer and you close tab, you should not remain logged in
3) XSS: Cross Site Scripting is when malicious scripts are injected into sites
4) Insecure Direct Object References:
5) Security Misconfiguration
6) Sensitive Data Exposure
7) Missing Function Level Access Control
8) Cross Site Request Forgery (CSRF)
9) Using Components with Known Vulnerabilities
10) Unvalidated Redirects and Forwards
What types of XSS exist?
Persistent and Non Persistent
What is the idea of risk management?
Identifying things that can go wrong with projects. These must be documented, identified and reviewed.
What types of risks exist?
Client
Schedule
Technology
Operational
What is the risk management approach?
Identify Assess Document Monitor and review Repeat
What is a client risk?
Client does something silly.
What is a schedule risk?
This is related to project management - running out of time or poor planing