Week 8 - Application Security Testing Flashcards
What is Application Security Testing?
- Refers to the practice of evaluating & testing software applications to identify & remediate vulnerabilities and weaknesses that could be exploited by attackers.
What does the Application Security Lifecycle Approach encompass?
Design, development, production & runtime.
What is the goal of Application Security Lifecycle?
To provide integrated security layers for applications defense.
What type of analysis should be conducted at the application level?
Thorough threat & vulnerability analysis.
What is the purpose of Static Code Analysis?
To identify vulnerabilities and security issues in the source code of software applications before they are compiled or executed.
Why is it important to identify core level vulnerabilities before execution?
It prevents potential security issues from being introduced into the running application, reducing the risk of attacks.
SAST tools can also check if your code adheres to coding standards and …?
Best practices.
What is data flow analysis, in the context of SAST?
Can trace how data flows through the application and can identify potential security issues related to data handling.
What is dependency scanning, in the context of SAST?
Analyze third-party libraries and components used in the application to identify known vulnerabilities.
What is false positive reduction, in the context of SAST?
Reduce false positives (non-existent issues reported as vulnerabilities) by using various techniques like pattern recognition & code context analysis.
What is Interactive Application Security Testing (IAST)?
IAST is a dynamic security testing technique used to assess the security of web applications and APIs during runtime while they are actively running or being tested.
How does IAST differ from SAST and DAST?
IAST combines elements of both SAST and DAST to provide a comprehensive assessment.
What does IAST monitor during runtime?
Instruments the application to monitor its behavior, interactions with components, databases, and external services, and actively identifies security vulnerabilities by analyzing these interactions.
How does DAST detect SQL injection?
DAST detects SQL injection vulnerabilities by sending malicious SQL queries as input and checking if they are executed by the database.
How does DAST detect Directory Traversal?
DAST detects directory traversal vulnerabilities by sending requests that attempt to access files or directories outside the intended scope.