Software Development Security (ch 20-21) Flashcards
1
Q
What are the stages of the Software Capability Maturity Model?
A
Level 1: Initial (disorganized, little or no defined process) Level 2: Repeatable Level 3: Defined Level 4: Managed Level 5: Optimizing
2
Q
What are the stages of the IDEAL model?
A
Initiating Diagnosing Establishing Acting Learning
3
Q
What character, if eliminated from all web form input, would prevent the execution of many cross-site scripting attacks?
A
Cross-site scripting attacks pass the tag to a browser. Preventing the use of the < character blocks most attempts to perform these attacks, although they are still possible when using obfuscation techniques.
4
Q
What is the most common programmer-generated security flaw?
A
By far, the buffer overflow is the most common, and most avoidable, programmer-generated vulnerability.