Strategies to protect against web application risks Flashcards

1
Q

What are some tactics to defend against an SQL injection attack?

A

Security Testing:
Conduct regular security testing, including penetration testing and code reviews, to identify and remediate SQL injection vulnerabilities in your application code.

Database Firewalls:
Consider implementing database firewalls or intrusion detection systems (IDS) that can detect and block SQL injection attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If no user input can be trusted, how should this be checked (validated)?

A

No user input should be used without being treated and any active script should be removed before the query request is passed to the SQL server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some tactics to defend against an XSS attack?

A

Security Awareness Training:
Train your development team on secure coding practices, especially regarding XSS vulnerabilities.

Browser Updates:
Encourage users to keep their web browsers up-to-date, as modern browsers often include security enhancements to protect against XSS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a buffer overflow attack? How could this vulnerability be prevented?

A

A buffer overflow attack occurs when a program writes too much data into a buffer, potentially leading to memory corruption. Prevention involves careful coding and input validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can a server be defended against a DoS, or DDoS attack?

A

Be vigilant

  • Identify out-of-date browser agents, which often disguise legacy
    bots.
  • Monitor website traffic.
  • Be alert for public data breaches.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is the management of security achieved with third-party software?

A

Managing security with third-party software entails choosing trusted vendors, keeping the software updated, and implementing security policies, monitoring, and audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly