SWE210 Software Security Week 5

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

flashcard set

Earn XP

Description and Tags

These flashcards cover essential vocabulary related to software security, focusing on terms and concepts relevant to web vulnerabilities, architectures, and prevention measures.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Static Website Architecture

A type of web design where all pages are pre-created and served to users without dynamic content.

2
New cards

Dynamic Website Architecture

A web design that generates pages dynamically based on user input and interactions with a database.

3
New cards

Same-Origin Policy (SOP)

A security rule in web browsers that prevents websites from accessing data from different origins.

4
New cards

Cross-Origin

When any one of the three components (protocol, domain, port) differs from the original origin.

5
New cards

Script Injection

A security vulnerability that occurs when an attacker injects malicious code or scripts into a web application.

6
New cards

Cross-site Scripting (XSS)

A type of script injection attack that allows attackers to execute malicious JavaScript in another user's browser.

7
New cards

Reflected XSS

A non-persistent XSS attack where the malicious script originates from the current HTTP request.

8
New cards

Stored XSS

A persistent XSS attack where the malicious script is stored in the website's database and served to other users.

9
New cards

DOM-based XSS

A type of XSS attack where the vulnerability is exploited through manipulation of the Document Object Model on the client side.

10
New cards

WAF (Web Application Firewall)

A security tool that uses signature-based filtering to automatically block malicious attempts.

11
New cards

Input Validation

The process of ensuring that user input matches expected formats before processing.

12
New cards

Whitelisting

A security approach that only allows specific characters and patterns in user input.

13
New cards

Content Security Policy (CSP)

A security policy that restricts the sources from which scripts can be executed.

14
New cards

Malicious Script

Code injected by an attacker with the intent of causing harm or unauthorized actions.

15
New cards

HTTP Request

A message sent by a client to a server to initiate some action or request information.

16
New cards

HTTP Response

A message from a server back to a client, containing the requested information or acknowledgment of an action.

17
New cards

URL Encoding

A method to encode information in a Uniform Resource Locator (URL) for transmission.

18
New cards

Cookies

Data sent to and from an HTTP header that stores user-specific information to enhance the browsing experience.

19
New cards

Data Application

An application that processes data and provides services over the web.

20
New cards

Attack Vector

The method used by an attacker to gain unauthorized access to a system.

21
New cards

Session Cookie

A cookie that stores session-specific data and expires when the session ends.

22
New cards

Cross-Site Request Forgery (CSRF)

A type of security vulnerability that occurs when an attacker tricks a user's browser into executing unauthorized actions.

23
New cards

CSRF Token

A unique token generated for each user session, used to validate the authenticity of incoming requests.

24
New cards

Referrer Policy

A setting that controls how much referrer information is shared when navigating from one site to another.

25
New cards

Malicious Code

Code designed to disrupt, damage, or gain unauthorized access to computer systems.

26
New cards

Attacker

A malicious individual who attempts to exploit vulnerabilities in the system.

27
New cards

Victim

The user or system targeted by the attacker.

28
New cards

Web Server

A server that hosts websites and delivers content to users through web browsers.