Security Assessment and Testing Domain Flashcards

1
Q

2011 CWE/SANS Top 25 Most Dangerous Software Errors

A

A list of the most widespread and critical errors that can lead to serious vulnerabilities in software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Audit Records

A

Contain security event information such as successful and failed authentication attempts; file accesses; security policy changes; account changes; and use of privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Architecture Security Reviews

A

A manual review of the product architecture to ensure that it fulfills the necessary security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Automated Vulnerability Scanners

A

Tests an application for the use of system components or configurations that are known to be insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Condition Coverage

A

This criteria requires sufficient test cases for each condition in a program decision to take on all possible outcomes at least once. It differs from branch coverage only when multiple conditions must be evaluated to reach a decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Flow Coverage

A

This criteria requires sufficient test cases for each feasible data flow to be executed at least once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Decision (Branch) Coverage

A

Considered to be a minimum level of coverage for most software products; but decision coverage alone is insufficient for high-integrity applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information Security Continuous Monitoring (ISCM)

A

Maintaining ongoing awareness of information security; vulnerabilities; and threats to support organizational risk management decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intrusion Detection Systems (IDS)

A

Real-time monitoring of events as they happen in a computer system or network; using audit trail records and network traffic and analyzing events to detect potential intrusion attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intrusion Prevention Systems (IPS)

A

Any hardware or software mechanism that has the ability to detect and stop attacks in progress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Loop Coverage

A

This criteria requires sufficient test cases for all program loops to be executed for zero; one; two; and many iterations covering initialization; typical running; and termination (boundary) conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Misuse Case

A

A Use Case from the point of view of an Actor hostile to the system under design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multi-Condition Coverage

A

This criteria requires sufficient test cases to exercise all possible combinations of conditions in a program decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Negative Testing

A

Ensures the application can gracefully handle invalid input or unexpected user behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Path Coverage

A

This criteria requires sufficient test cases for each feasible path; basis path; etc.; from start to exit of a defined program segment; to be executed at least once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Positive Testing

A

Determines that your application works as expected.

17
Q

Real User Monitoring (RUM)

A

An approach to web monitoring that aims to capture and analyze every transaction of every user of a website or application.

18
Q

Regression Analysis

A

The determination of the impact of a change based on review of the relevant documentation.

19
Q

Security Log Management

A

The process for generating; transmitting; storing; analyzing; and disposing of computer security log data.

20
Q

Statement Coverage

A

This criteria requires sufficient test cases for each program statement to be executed at least once; however; its achievement is insufficient to provide confidence in a software product’s behavior.

21
Q

Static Source Code Analysis (SAST)

A

Analysis of the application source code for finding vulnerabilities without actually executing the application.

22
Q

Synthetic Performance Monitoring

A

Involves having external agents run scripted transactions against a web application.

23
Q

System Events

A

Operational actions performed by OS components; such as shutting down the system or starting a service.

24
Q

Threat Modeling

A

A process by which developers can understand security threats to a system; determine risks from those threats; and establish appropriate mitigations.

25
Q

Use Cases

A

Abstract episodes of interaction between a system and its environment.

26
Q

Validation

A

The determination of the correctness; with respect to the user needs and requirements; of the final program or software produced from a development project.

27
Q

Verification

A

The authentication process by which the biometric system matches a captured biometric against the person’s stored template.

28
Q

Vulnerability Management Software

A

Log the patch installation history and vulnerability status of each host; which includes known vulnerabilities and missing software updates.

29
Q

Web Proxies

A

Intermediate hosts through which websites are accessed.

30
Q

White-box Testing

A

A design that allows one to peek inside the “box” and focuses specifically on using internal knowledge of the software to guide the selection of test data.