1/15
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Network-based applications
Tools available for use on a network, such as word processing programs and email, that employ a client-server architecture. The server provides a service to the client.
Fuzzing
A software testing technique that throws random information at servers to discover how software responds to errors and identify potential vulnerabilities.
Error and Exception Handling
The process of suppressing certain error messages to prevent attackers from gaining information about a system or application.
Input validation
Testing user input to ensure it meets requirements and prevent malicious code injection.
Cross Site Scripting (XSS)
A type of attack that can be prevented by validating application input, running anti-spyware and anti-malware programs, and addressing vulnerabilities with patches.
Server Side Request Forgery (SSRF)
An attack where an attacker sends requests from a trusted application to target systems behind firewalls, which can be prevented with add-ons, web application firewalls, and filtering traffic.
Application Patch Management
The process of scanning for and installing patches to fix vulnerabilities in software and applications, while ensuring patches are validated and authenticated.
Secure Coding Concepts
Building security into an application from the beginning, rather than adding it as an afterthought.
Host-based firewall
A software-based firewall installed on individual host machines to protect them from traffic coming in and leaving the system.
Anti-malware software
Software designed to detect and remove viruses, worms, and trojans from host machines.
Anti-spyware
Software that removes tracking cookies and other spyware from devices.
Virtualization
A technology that allows multiple virtual machines to run on a single physical host machine, sharing resources such as processor, RAM, and ports.
Hypervisor
A software environment that creates and manages virtual machines on a host machine.
Screen locks
A security feature that requires a PIN or password to unlock a mobile device and prevent unauthorized access.
Remote wipe
A feature that allows device administrators to erase content on a lost or stolen device remotely.
GPS tracking
A feature that allows device administrators to track the location of a lost or stolen device.