Topic 2 Flashcards

1
Q

What is Un-validated Input?

A

Input received by program from untrusted source is a potential target for attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Possible threats of Unvalidated Input?

A

**– Buffer Overflows **- input that has been designed to overwrite program execution space
**– Cross Site Scripting ** input that contains scripts to be executed on other user’s browsers
– Command Injection - input that is modified to contain executable commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to validate all inputs?

A
  • Limit maximum input character length
  • Numbers: check bounds - min & max
  • Make sure encodings (e.g. UTF-8, URL encoding) are legal and decoded results are legal
  • Aware of various data types and input sources – Watch out for special characters (e.g. ‘, <, >)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Stack?

A

– Memory is allocated for automatic (local) variables within functions its used for temporary storage of information.
– Last In First Out (LIFO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Heap?

A

– Memory allocated in the heap remains in existence for the duration of a program. It is used for dynamic memory allocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Stack and Heap?

A

– Memory space for objects is always allocated in heap. Variables are placed on stack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Benefits of threat modelling

A
  • Discovers system threats before coding
  • Saves cost as flaws are addressed during design time
  • Validate the architecture and design
  • Contribute to the risk management and Attack Surface Reduction process
  • Guide the code review process and penetration testing process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Principles

A
  • Minimize your attack surface
  • Employ secure defaults
  • Assume external systems are insecure
  • Fail safely
  • Never rely on security through obscurity alone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Purpose of threat modelling

A
  1. Understand security threats to a system
  2. Determine risks from those threats
  3. Establish appropriate mitigations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly