Security (Week 6, part #1) Flashcards
What does OWASP stand for?
Open Web Application Security Project
What is OWASP used for?
Tracking web development issues around security
What are the top 10 security problems?
- Injection
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging and Monitoring
What is the security problem ‘Injection’?
Any time sending untrusted data and received by interpreter –> could trick and send malicious code
What is the security problem ‘Broken Authentication’?
Authentication and session management broken
What is the security problem ‘Sensitive Data Exposure’?
Occurs when an application, company, or other entity inadvertently exposes personal data.
What is the security problem ‘XML Eternal Entities (XXE)’?
XML external entities are a type of custom XML entity whose defined values are loaded from outside of the DTD (document type definition) in which they are declared.
External entities are particularly interesting from a security perspective because they allow an entity to be defined based on the contents of a file path or URL
What is the security problem ‘Broken Access Control’?
Note what access control enforces and what failures lead to.
Access control enforces policy such that users cannot act outside of their intended permissions.
Failures typically lead to unauthorized information disclosure, modification or destruction of all data, or performing a business function outside of the limits of the user.
What is the security problem ‘Security Misconfiguration’?
Security misconfigurations are security controls that are inaccurately configured or left insecure, putting your systems and data at risk.
Basically, any poorly documented configuration changes, default settings, or a technical issue across any component in your endpoints could lead to a misconfiguration
What is the security problem ‘Cross-Site Scripting (XXS)?
Found in websites and/or web applications that accept user input.
Cybercriminals exploit this vulnerability by inputting strings of executable malicious code into these functions.
This injects the malicious code into the targeted website’s content, making it a part of the website and thus allowing it to affect victims who may visit or view that website.
What is the security problem ‘Insecure Deserialization’?
Vulnerability in which an untrusted or unknown data is used to either inflict a denial of service attack (DoS attack), execute code, bypass authentication or further abuse the logic behind an application.
Serialized objects can be structured in text such as JSON, XML or YAML.
What is the security problem ‘Using Components with Known Vulnerabilities’?
occurs when the components such as libraries and frameworks used within the app almost always execute with full privileges.
If a vulnerable component is exploited, it makes the hacker’s job easier to cause a serious data loss or server takeover.
What is the security problem ‘Insufficient Logging and Monitoring’?
occur when the security-critical event is not logged off properly, and the system is not monitored.
Lack of such functionalities can make malicious activities harder to detect and in turn affects the incident handling process.
When is there a danger of introducing an injection vulnerability?
Any time an application uses an interpreter of any type
When must information be scrubbed?
When a web application passes information from an HTTP request through as part of an external request
What is SQL injection?
Web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve.
A particularly widespread and dangerous form of injection
What is command injection?
cyber attack that involves executing arbitrary commands on a host operating system (OS).
Typically, the threat actor injects the commands by exploiting an application vulnerability, such as insufficient input validation
What are the three basics of all injections?
- All injection flaws are input-validation errors. •i.e. you’re not checking the input properly
- Input is not just text fields
- All external input is a source of a threat. -> The input contains the data with the threat