Web-based Architecture Risk Flashcards

1
Q

What do Rich Internet Applications (RIAs) typically provide?

A

Desktop-like services through a web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In RIAs, where does the user interface usually run?

A

On the client side, often within a web browser sandbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where does data processing and storage typically occur in RIAs?

A

Back on the server side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a primary benefit of client-side processing/validation?

A

It can provide immediate feedback and error correction without sending invalid data to the server first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the main security drawback of client-side validation?

A

Anything done on the client side can be changed or bypassed by the client (e.g., using proxies); client input cannot be trusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of a sandbox in web applications?

A

To provide isolation and separation, controlling what code can do and restricting access outside the designated area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What technology is often used as the basis for sandboxing?

A

Virtualization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Remote Code Execution (RCE)?

A

An attack where hackers gain the ability to run their own (arbitrary) code on a remote machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What privilege level does remotely executed code often inherit initially?

A

The same privilege level as the user running the compromised process on the machine (often admin level).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is the “always-on” nature of devices a security concern?

A

Continuous connectivity makes them a constant target for attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What types of devices often lack built-in security and become botnet targets?

A

IoT devices and IP cameras.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is pervasive or ubiquitous computing?

A

The embedding of computing technologies into everyday objects and environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What major risk area is created by pervasive computing?

A

The Internet of Things (IoT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are many IoT devices considered risky?

A

They were often built for function without security considerations and are network-connected, providing attack vectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are SCADA and ICS primarily used for?

A

Managing industrial processes, infrastructure (like traffic), and building management systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are key security risks associated with SCADA/ICS systems?

A

Often built without security, difficult to patch, contain known vulnerabilities, and lack rigorous testing.

17
Q

What real-world breach originated from a building management (air conditioning) system?

A

The breach of a very large US retailer.

18
Q

What risk arises from connecting IoT or ICS devices directly to production networks?

A

Lack of separation means vulnerabilities in these devices can directly expose critical business networks.

19
Q

What examples illustrate risks in connected medical devices or vehicles?

A

A medical device rebooting during surgery due to a patch; a car restarting while driving due to an update.

20
Q

What are the main security concerns for wireless communications (like 802.11)?

A

Interception (confidentiality loss), modification (integrity loss), and jamming (availability loss).

21
Q

What is mobile code in this context?

A

Code designed to be executed on a remote system, often via a browser or document.

22
Q

What is “active content”?

A

Mobile code that can execute automatically on a user’s system, often without direct user interaction.

23
Q

What are common carriers of mobile code mentioned?

A

PDFs, Java applets, ActiveX controls, macros in word processor files, Flash/Shockwave files.

24
Q

What NIST publication addresses mobile code risks?

A

SP 800-28 Rev 2.

25
Q

What must software designers be aware of regarding architectural approaches?

A

Each approach has its own associated vulnerabilities that need to be understood and addressed.