SON 4 Flashcards

1
Q

How do attackers use memory injection, and how can it be prevented?

A

πŸ”Ή Memory Injection – Injecting malicious code into a program’s memory.
πŸ”Ή Common Techniques – Code injection, buffer overflows, DLL injection.
πŸ”Ή Goal – Execute arbitrary code by exploiting vulnerabilities.
πŸ”Ή Prevention – Secure coding, input validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a race condition, and how does TOCTOU exploitation work?

A

πŸ”Ή Race Condition – Timing issue where attackers exploit changes in a system’s state.
πŸ”Ή TOCTOU (Time-of-Check to Time-of-Use) – A resource is checked, then altered before use.
πŸ”Ή Example – File access attacks using symbolic links to bypass security.
πŸ”Ή Prevention – Use atomic operations & proper synchronization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can malicious updates compromise security, and how are they prevented?

A

πŸ”Ή Malicious Update – Fake update that weakens system security.
πŸ”Ή Goal – Trick users into installing compromised software.
πŸ”Ή Prevention – Use code signing to verify legitimate updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why are outdated operating systems (EOL- End of Life) a security risk?

A

πŸ”Ή OS Weaknesses – Can allow unauthorized access or privilege escalation.
πŸ”Ή Fix – Regular OS updates & patches.
πŸ”Ή Risk – Unsupported OS (e.g., Windows XP, 7) gets no security updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does SQL injection exploit the connection between front-end inputs and the back-end database?

A

Flashcard: SQL Injection (SQLi)
πŸ”Ή SQLi Attack – Injecting malicious SQL code into input fields.
πŸ”Ή How it works – Exploits poorly validated inputs in a website’s front-end to manipulate the database (back-end).
πŸ”Ή Common goal – Bypass authentication, steal or delete data, or modify records.
πŸ”Ή Example – Entering β€˜ OR 1=1 – in a login field tricks the database into always returning β€œtrue,” granting access.
πŸ”Ή Prevention – Use prepared statements, parameterized queries, and input validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does XSS allow attackers to manipulate web applications and users?

A

πŸ”Ή XSS Attack – Injecting malicious scripts into web pages.
πŸ”Ή How it works – Exploits unvalidated user input to run scripts in other users’ browsers.
πŸ”Ή Common goal – Steal cookies, hijack sessions, or deface webpages.
πŸ”Ή Example – Inserting

alert('Hacked!')
into a comment box executes unwanted code.
πŸ”Ή Prevention – Input validation, output encoding, and Content Security Policy (CSP).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are outdated or unsupported hardware devices a security risk?

A

πŸ”Ή Firmware Vulnerabilities – Weaknesses in low-level software running on devices.
πŸ”Ή End-of-Life Hardware – Unsupported devices with no security updates.
πŸ”Ή Legacy Hardware – Old devices that lack modern security protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are common security risks in virtualization?

A

πŸ”Ή VM Escape – Attacker breaks out of a virtual machine to access the host system.
πŸ”Ή Resource Reuse – Sensitive data left in system resources can be accessed by other processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can weak access controls and account hijacking compromise cloud security?

A

πŸ”Ή Data Breaches – Sensitive cloud data is a prime target for hackers.
πŸ”Ή Weak Access Controls – Poor authentication & credential management lead to unauthorized access.
πŸ”Ή Account Hijacking – Stolen cloud accounts allow attackers to manipulate data and intercept transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are APIs and system vulnerabilities major risks in cloud security?

A

πŸ”Ή Insecure APIs – Poorly secured cloud interfaces can be exploited.
πŸ”Ή System Vulnerabilities – Complex cloud infrastructures may contain exploitable weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly