Software Development Security Flashcards
Adware
Software to generate ads that installs itself on your computer when you download some other (usually free) program from the web.
Aggregation
A relation, such as CONSISTS OF or CONTAINS, between types that defines the composition of a type from other types.
Application Programming Interface (API)
A set of calling conventions defining how a service is invoked through a software package.
Botnets
A network of infected zombie computers controlled by a botherder. Botnets range in size from a just handful of infected computers to hundreds of thousands or millions. Also known as botherd.
Buffer overflow
An anomaly where a program, while writing data to a buffer, overruns the buffer’s boundary and ovewrites adjacent memory. This is a special case of violation of memory safety.
Cookie poisoning (manipulation)
Attacks involving the modification of the contents of a cookie in order to bypass security mechanisms.
Covert channel
A channel of communication within a computer system, or network, that is not designed or intended to transfer information.
Cross Site Request Forgeries (CSRF)
A type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Cross-Site Scripting (XSS)
A type of computer security vulnerability typically found in Web applications. XSS enables attackers to inject client-side script into Web pages viewed by other users.
Dangling pointer
Pointers that do not point to a valid object of the appropriate type.
Data hiding
A software development technique specifically used in object-oriented programming (OOP) to hide internal object details (data members). Data hiding ensures exclusive data access to class members and protects object integrity by preventing unintended or intended changes.
Denial of Service (DoS)
The unauthorized prevention of authorized access to resources or the delaying of time-critical operations.
Distributed Denial of Service (DDoS)
Multiple computers flooding a Web site with so many requests for service that it slows down or crashes.
Fast flux botnets
A DNS technique used by botnets to hide phising and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.
Garbage collection
A language mechanism that automatically deallocates memory for objects that are not accessible or referenced.