Unit 4: Apply the Secure Software Development Life Cycle Flashcards
What are common vulnerabilities in the Software Development Life cycle according to the OWASP TOP Ten project
- Injection
- Broken Authentication and Session Management
- Cross-site Scripting (XSS)
- Insecure Direct Object References
- Security Misconfiguration
- Sensitive Data Exposure
- Missing Function Level Access Control
- Cross-site Request Forgery (CSRF)
- Using Components with Known Vulnerabilities
- Unvalidated Redirects and Forwards.
Forces a logged-on victim to send a forged HTTP request to a vulnerable web application
Cross-site Request Forgery (CSRF)
When attackers redirect victims to phishing or malware sites or use forwards to access unauthorized pages
Unvalidated Redirects and forwards
Occurs when untrusted data is sent to an interpreter as part of a command or query
injection
Occurs when a developer exposes a reference to an internal implementation object
Insecure Direct Object References
Occurs whenever an application takes untrusted data and sends it to a web browser without proper validation or escaping
Cross-site Scripting (XSS)
What is the STRIDE Threat Model
Spoofing Tampering Repudiation Information Disclosure Denial of Privilege Elevation of Privilege