Week 2 Classification of Attacks, Software Weapons and Social Engineering Flashcards

1
Q

What is secure coding and why is it important?

A

Secure coding, also referred to as secure programming, involves writing code in a high-level language that follows strict principles, with the goal of preventing potential vulnerabilities

More and more financial transactions are also moving online. Security incidents often originate deep in an application’s underlying software and can have serious consequences for businesses and individuals alike. Insecure code in important industries (e.g., finance, healthcare, energy, and transport) could result in financial and property damages, market manipulation and theft, even physical harm and fatalities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three axes of classifcation of possible attacks?

A
  • the state of the asset,
  • the type of assurance the asset offers,
  • and the type of vulnerability necessary for an attack to be carried out.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the attacks on the CIA Triad called?

A

DAD
Disclosure
Alteration
Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does STRIDE mean?

A

Spoofing
Tampering
Repudiation
Information disclosure
Denial of Service
Elevation of Privelage

https://mylms.vossie.net/pluginfile.php/763792/mod_book/chapter/961633/image.png

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the information states?

A

Storage
Transmission
Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 7 layers of OSI

A
  1. Physical
  2. Data Link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The software weapons

A
  • Adware
  • Trojan
  • Ransomware
  • Back Door
  • Virus
  • SPAM
  • Botware
  • SEO
How well did you know this?
1
Not at all
2
3
4
5
Perfectly