Week 8 - Application Security Testing Flashcards

1
Q

What is Application Security Testing?

A
  • Refers to the practice of evaluating & testing software applications to identify & remediate vulnerabilities and weaknesses that could be exploited by attackers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the Application Security Lifecycle Approach encompass?

A

Design, development, production & runtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the goal of Application Security Lifecycle?

A

To provide integrated security layers for applications defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of analysis should be conducted at the application level?

A

Thorough threat & vulnerability analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of Static Code Analysis?

A

To identify vulnerabilities and security issues in the source code of software applications before they are compiled or executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is it important to identify core level vulnerabilities before execution?

A

It prevents potential security issues from being introduced into the running application, reducing the risk of attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SAST tools can also check if your code adheres to coding standards and …?

A

Best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data flow analysis, in the context of SAST?

A

Can trace how data flows through the application and can identify potential security issues related to data handling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is dependency scanning, in the context of SAST?

A

Analyze third-party libraries and components used in the application to identify known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is false positive reduction, in the context of SAST?

A

Reduce false positives (non-existent issues reported as vulnerabilities) by using various techniques like pattern recognition & code context analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Interactive Application Security Testing (IAST)?

A

IAST is a dynamic security testing technique used to assess the security of web applications and APIs during runtime while they are actively running or being tested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does IAST differ from SAST and DAST?

A

IAST combines elements of both SAST and DAST to provide a comprehensive assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does IAST monitor during runtime?

A

Instruments the application to monitor its behavior, interactions with components, databases, and external services, and actively identifies security vulnerabilities by analyzing these interactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does DAST detect SQL injection?

A

DAST detects SQL injection vulnerabilities by sending malicious SQL queries as input and checking if they are executed by the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does DAST detect Directory Traversal?

A

DAST detects directory traversal vulnerabilities by sending requests that attempt to access files or directories outside the intended scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does DAST detect Authentication Bypasses?

A

DAST identifies authentication weaknesses by attempting to access restricted resources without proper credentials.

17
Q

What is Dynamic Application Security Testing (DAST)?

A

Used to evaluate the security of web applications and APIs during runtime by interacting with them as external attackers might.

18
Q

How does DAST detect cross-site scripting (XSS)?

A

By injecting malicious scripts into input fields or URL parameters and analyzing the applications responses.

19
Q

What is the main purpose of DAST in a production environment?

A

To assess the security of applications in real-time by simulating attacks to uncover vulnerabilities that may be exploited by external attackers.

20
Q

What is Runtime Application Self-Protection (RASP)?

A

A security technology integrated directly into an application or its runtime environment to protect against security threats during runtime.

21
Q

How does RASP prevent SQLi attacks?

A

RASP detects SQL injection attempts by analyzing SQL queries in real-time and can block or sanitize them to prevent unauthorized access or modification of the database.

22
Q

Why is RASP important?

A

It provides real-time protection against security threats, enabling applications to respond to attacks as they occur.

23
Q

How does RASP protect against Cross-Site Scripting (XSS) attacks?

A

Monitoring user inputs and the content rendered in the browser, blocking or sanitizing any detected script injection attempts.

24
Q

What role does RASP play in authentication and session management security?

A

RASP detects and responds to authentication issues, such as brute force attacks or session fixation, by blocking suspicious login attempts or invalidating compromised sessions.