Web Security, Security Management, Law, Ethics and Privacy (ch14, 15, 19) Flashcards
A cookie can be used to authenticate a user to a web site so that the user does not have to type in his password for each connection to the site.
True
Malicious JavaScripts is a major threat to browser security.
True
XSS is possible when a web site does not check user input properly and use the input in an outgoing html page.
True
XSS can perform many types of malicious actions because a malicious script is executed at user?s browser.
True
XSRF is possible when a user has a connection to a malicious site while a connection to a legitimate site is still alive.
True
In XSRF, the malicious site can send malicious script to execute in the user?s browser by embedding the script in a hidden iframe.
True
It is easy for the legitimate site to know if a request is really from the (human) user.
False
SQL injection attacks only lead to information disclosure.
False
Using an input filter to block certain characters is an effective way to prevent SQL injection attacks.
False
SQL injection is yet another example that illustrates the importance of input validation.
True
Organizational security objectives identify what IT security outcomes should be achieved.
True
Since the responsibility for IT security is shared across the
organization, there is a risk of inconsistent implementation of security and a loss of central monitoring and control.
True
Legal and regulatory constraints may require specific approaches to risk assessment.
True
One asset may have multiple threats and a single threat may target multiple assets.
True
It is likely that an organization will not have the resources to implement all the recommended controls.
True