XSS, Hardware vulnerabilities, Cloud-specific, Supply chain Flashcards

1
Q

XSS (Cross-site scripting)

A

Takes advantage of a trust a user has for website.
**commonly uses JavaScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Reflected XSS

A

Script is embedded in URL executes in the victim’s browser.
User is the person who executes the code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Persistent (stored) XSS

A

App stores user input, such as comments or messages, in its database and displays it to other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Protecting against XSS include:

A

-Careful clicking untrusted links
-Consider disabling JavaScript
-Update browser/apps
-Don’t allow users to add their own scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are hardware potential security risks?

A

perfect entry point form an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firmware

A

software inside of hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

End of Life (EOL)

A

Notice that the manufacturer is giving to everyone to let them know that in the future, they will stop selling this product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

End of service life (EOSL)

A

○ Manufacture stops selling product
○ Support is no longer available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List some virtualization vulnerabilities?

A

-Local privilege escalation
-Command injection
-Info disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hypervisor

A

Manages the relationship between physical & virtual resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or false: RAM is allocated and shared between VMs

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or false: Data can be inadvertently be shared between VMs

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud specific vulnerabilities (attacking the service) include:

A

-Authentication bypass
-Directory traversal
-Remote code execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication bypass

A

Take advantage of weak or faulty authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Directory traversal

A

Ability to manually move around the structure of that web server into folders & sub-directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote code execution

A

Take advantage of unpatched systems

17
Q

XSS

A

takes advantage of poor input validation

18
Q

Out of bounds write

A

Write to unauthorized memory areas

19
Q

When looking at service providers, consider-

A

ongoing security audits of all providers

20
Q

When looking at hardware providers, consider-

A
  1. Using a small supplier base; tighter control
  2. Strict control over policies & procedures
  3. Security should be part of overall design.
21
Q

When looking at software providers, consider-

A

Initial installation; digital signature
Updates & patches
Look at source code (someone who has access, has ability to make changes)