Unit 4: Apply the Secure Software Development Life Cycle Flashcards

1
Q

What are common vulnerabilities in the Software Development Life cycle according to the OWASP TOP Ten project

A
  1. Injection
  2. Broken Authentication and Session Management
  3. Cross-site Scripting (XSS)
  4. Insecure Direct Object References
  5. Security Misconfiguration
  6. Sensitive Data Exposure
  7. Missing Function Level Access Control
  8. Cross-site Request Forgery (CSRF)
  9. Using Components with Known Vulnerabilities
  10. Unvalidated Redirects and Forwards.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Forces a logged-on victim to send a forged HTTP request to a vulnerable web application

A

Cross-site Request Forgery (CSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When attackers redirect victims to phishing or malware sites or use forwards to access unauthorized pages

A

Unvalidated Redirects and forwards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Occurs when untrusted data is sent to an interpreter as part of a command or query

A

injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Occurs when a developer exposes a reference to an internal implementation object

A

Insecure Direct Object References

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Occurs whenever an application takes untrusted data and sends it to a web browser without proper validation or escaping

A

Cross-site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the STRIDE Threat Model

A
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Privilege
Elevation of Privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly