Security Mechanisms and Vulnerabilities (Basic) Flashcards

1
Q

What is the OWASP Top 10?

OWASP Top 10

A

A list of the most critical security risks for web applications, maintained by the Open Web Application Security Project (OWASP). This is subject to change every year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is SQL Injection (SQLi)?

OWASP Top 10

A

A vulnerability that allows attackers to manipulate SQL queries by injecting malicious input, potentially leading to data leakage or database compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cross-Site Scripting (XSS)?

OWASP Top 10

A

A vulnerability that allows attackers to inject malicious JavaScript into a webpage, which then executes in a user’s browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cross-Site Request Forgery (CSRF)?

OWASP Top 10

A

An attack where an authenticated user unknowingly executes unwanted actions on a web application through manipulated requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Server-Side Request Forgery (SSRF)?

OWASP Top 10

A

A vulnerability that allows an attacker to force a server to send unauthorized requests, often used to access internal systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is XML External Entity (XXE) injection?

OWASP Top 10

A

An attack exploiting weak XML parsers to execute malicious payloads, read sensitive files, or perform server-side request forgery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is insecure deserialization?

OWASP Top 10

A

A vulnerability where untrusted data is deserialized, potentially leading to remote code execution or privilege escalation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are business logic flaws?

OWASP Top 10

A

Security weaknesses that arise from improper handling of business rules, such as price manipulation or improper access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Insecure Direct Object Reference (IDOR)?

OWASP Top 10

A

A flaw where users can access unauthorized resources by modifying input values, such as user IDs in URLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly