ITEC 100 - WEEK 12

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

is an online security system that will control employee internet usage, prevent web-based threats, and limit access to dangerous websites.

Web security

2
New cards

These days, web security is crucial. Websites are always

vulnerable to security concerns and threats. As an example, your

online security is the protection of data as it is being transferred

between a client and a server.

Importance of Web Security

3
New cards

Attackers insert malicious queries into forms

SQL Injection

4
New cards

Injecting scripts into webpages

Cross-Site Scripting (XSS)

5
New cards

Forcing actions on authenticated users

Cross-Site Request Forgery (CSRF)

6
New cards

Tricking users to give credentials

Phishing and Social Engineering

7
New cards

Overwhelming the server by excessive traffic

Denial of Service (DoS)

8
New cards

Intercepting communications

Man-in-the-Middle Attacks

9
New cards

Verifies the identity of a user

or system, typically through login

credentials like usernames,

passwords, or multi-factor

authentication methods.

Authentication

10
New cards

Determines what authenticated

users are allowed to do—such as

accessing specific pages,

performing transactions, or

managing settings—based on

their roles or permissions.

Authorization

11
New cards

The practice of securing user

and system data from

unauthorized access,

modification, or breaches, often

using encryption, access control,

and secure storage practices.

Data Protection

12
New cards

A security principle ensuring

that a user or entity cannot deny

having performed a specific

action, supported by digital

signatures, secure logs, or

transaction records.

Nonrepudiation

13
New cards

(Prevent Web Server Bugs).

Refers to securing the server infrastructure by applying updates, disabling unused services, and configuring servers to reduce vulnerabilities and prevent exploitation.

Secure the Web Environment

14
New cards

(Prevent XSS and Injection Attacks).

Involves checking and sanitizing input fields to block malicious code that could exploit vulnerabilities like cross-site scripting (XSS) or SQL injection.

Validate User Input

15
New cards

Limiting or carefully evaluating

the use of external JavaScript or

stylesheets to prevent attackers

from injecting harmful content

through trusted-looking sources.

Avoid Third-Party Scripts and CSS

16
New cards

(Protect Data, Prevent Mixed Content Bugs)

Applying secure protocols like

HTTPS to encrypt data in transit,

ensuring confidentiality and

preventing attackers from

exploiting mixed content

vulnerabilities.

Use Encryption

17
New cards

Selecting appropriate and

secure methods of user

verification (e.g., OAuth,

biometrics, MFA) based on the

application's sensitivity and user

roles.

Use the Right Authentication

18
New cards

Ensures that only valid and

intended requests are executed

by checking for tokens, referrer

headers, or user sessions to

prevent cross-site request

forgery (CSRF) or script inclusion

attacks (XSSI).

Authorize Requests

19
New cards

A browser feature that helps protect against

XSS and data injection by controlling which

sources are allowed to load content like scripts,

styles, and images.

Content Security Policy (CSP)

20
New cards

filter and sanitize all user input

Input Validation

21
New cards

Implement MFA, strong password policies

Secure Authentication

22
New cards

secure tokens, session timeouts

Session Management

23
New cards

fix vulnerabilities quickly

Regular Updates and Patching

24
New cards

protect data in transit

HTTPS and Encryption

25
New cards

detect and block threats

Web Application Firewall (WAF)

26
New cards

conduct SAST, DAST, penetration testing

Security Testing