Web Security, Security Management, Law, Ethics and Privacy (ch14, 15, 19) Flashcards
A cookie can be used to authenticate a user to a web site so that the user does not have to type in his password for each connection to the site.
True
Malicious JavaScripts is a major threat to browser security.
True
XSS is possible when a web site does not check user input properly and use the input in an outgoing html page.
True
XSS can perform many types of malicious actions because a malicious script is executed at user?s browser.
True
XSRF is possible when a user has a connection to a malicious site while a connection to a legitimate site is still alive.
True
In XSRF, the malicious site can send malicious script to execute in the user?s browser by embedding the script in a hidden iframe.
True
It is easy for the legitimate site to know if a request is really from the (human) user.
False
SQL injection attacks only lead to information disclosure.
False
Using an input filter to block certain characters is an effective way to prevent SQL injection attacks.
False
SQL injection is yet another example that illustrates the importance of input validation.
True
Organizational security objectives identify what IT security outcomes should be achieved.
True
Since the responsibility for IT security is shared across the
organization, there is a risk of inconsistent implementation of security and a loss of central monitoring and control.
True
Legal and regulatory constraints may require specific approaches to risk assessment.
True
One asset may have multiple threats and a single threat may target multiple assets.
True
It is likely that an organization will not have the resources to implement all the recommended controls.
True
The IT security management process ends with the implementation of controls and the training of personnel.
False
The relative lack of success in bringing cybercriminals to justice has led to an increase in their numbers, boldness, and the global scale of their operations.
True
The purpose of the privacy functions is to provide a user protection against discovery and misuse of identity by other users.
True
An IT security plan should include details of ________.
A. risks
B. recommended controls
C. responsible personnel
D. all of the above
D
______ is a function that removes specific identifying information from query results, such as last name and telephone number, but creates some sort of unique identifier so that analysts can detect connections between queries.
A. Anonymization
B. Data transformation
C. Immutable audit
D. Selective revelation
A
Web browser can be attacked by any website that it visits.
True
Even if a browser is compromised, the rest of the computer is still secure.
False
Web servers can be compromised because of exploits on web applications.
True