• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
What is 'Cross-site Scripting'?
It's pretty much inevitable when you combine the stateless nature of HTTP, the mixture of data and script in HTML, lots of data passing between web sites, diverse encoding schemes, and feature-rich web browsers.
What is 'SQL Injection'?
If attackers can influence the SQL that you use to communicate with your database, then suddenly all your fun and profit belongs to them. If you use SQL queries in security controls such as authentication, attackers could alter the logic of those queries to bypass security.
What is 'Classic Buffer Overflow'?
Buffer overflows are Mother Nature's little reminder of that law of physics that says: if you try to put more stuff into a container than it can hold, you're going to make a mess
What is Cross-Site Request Forgery?
Cross-site request forgery is like that strange package, except the attacker tricks a user into activating a request that goes to your site.
What is Improper Access Control (Authorization)?
If you don't ensure that your software's users are only doing what they're allowed to, then attackers will try to exploit your improper authorization and exercise unauthorized functionality that you only intended for restricted users.
What is the top 6 programming errors?
Reliance on Untrusted Inputs in a Security Decision
What is 'Path Traversal'?
While data is often exchanged using files, sometimes you don't intend to expose every file on your system while doing so. When you use an outsider's input while constructing a filename, the resulting path could point outside of the intended directory. An attacker could combine multiple ".." or similar sequences to cause the operating system to navigate out of the restricted directory, and into the rest of the system.
What is the top 8 programming errors?
Unrestricted Upload of File with Dangerous Type
What is 'OS Command Injection'?
When you invoke another program on the operating system, but you allow untrusted inputs to be fed into the command string that you generate for executing that program, then you are inviting attackers to cross that bridge into a land of riches by executing their own commands instead of yours.
Missing Encryption of Sensitive Data
If your software stores sensitive information on a local file or database, there may be other ways for attackers to get at the file. They may benefit from lax permissions, exploitation of another vulnerability, or physical theft of the disk. You know those massive credit card thefts you keep hearing about? Many of them are due to unencrypted storage.
What is the top 11 programming error?
Use of Hard-coded Credentials
What is the top 12 programming error?
Buffer Access with Incorrect Length Value
What is 'PHP File Inclusion'?
you can make a lot of smaller parts of a document (or program), then combine them all together into one big document (or program) by "including" or "requiring" those smaller pieces.
What is the top 14 programming error?
Improper Validation of Array Index
What is the top 15 programming error?
Improper Check for Unusual or Exceptional Conditions
What is the top 16 programming error?
Information Exposure Through an Error Message
Integer Overflow or Wraparound
Ultimately, it's buried deep in the DNA of computers, who can't count to infinity even if it sometimes feels like they take that long to complete an important task. When programmers forget that computers don't do math like people, bad things ensue - anywhere from crashes, faulty price calculations, infinite loops, and execution of code.
Incorrect Calculation of Buffer Size
Any number of problems could produce the incorrect calculation, but when all is said and done, you're going to run head-first into the dreaded buffer overflow.
Missing Authentication for Critical Function
This works because the pathway into the building doesn't have all those nosy security guards asking for identification. Software may expose certain critical functionality with the assumption that nobody would think of trying to do anything but break in through the front door.
Download of Code Without Integrity Check
When this happens, your software will wind up running code that it doesn't expect, which is bad for you but great for attackers.
Incorrect Permission Assignment for Critical Resource
If you have critical programs, data stores, or configuration files with permissions that make your resources readable or writable by the world - well, that's just what they'll become.
Allocation of Resources Without Limits or Throttling
The lack of control over resource allocation is an avenue for attackers to cause a denial of service against other users of your software, possibly the entire system - and in some cases, this can be leveraged to conduct other more devastating attacks.
What is 'Open Redirect'?
Many web applications have implemented redirect features that allow attackers to specify an arbitrary URL to link to, and the web client does this automatically.
What is the top 24 programming error?
Use of a Broken or Risky Cryptographic Algorithm
Race Condition
Your only comfort with race conditions is that data corruption and denial of service are the norm. Reliable techniques for code execution haven't been developed - yet.