Software Security - Week 13

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Flashcards for reviewing web security concepts from SWE210 lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Web Security

Protecting networks and computer systems from damage or theft of software, hardware, or data.

2
New cards

Web Security

Maintains the smooth operation of businesses using computers and prevents manipulation by hackers and malware.

3
New cards

Denial-of-Service (DoS) Attack

An attack where an attacker causes a web server to be unavailable.

4
New cards

distributed DoS (DDoS)

DoS attack using lots of computers.

5
New cards

Direct attack

Attacking the machine itself in a DoS attack.

6
New cards

Indirect attack

Attacking something that points to the machine in a DoS attack.

7
New cards

Reputation attack

Attack that references the machine in some way but doesn't directly involve it.

8
New cards

SYN Flooding

Subverts the TCP/IP 3-way handshake by sending many SYN requests.

9
New cards

Packet sniffing

Listening to traffic sent on a network.

10
New cards

Password cracking

Guessing the passwords of privileged users of a system.

11
New cards

Brute force attack

Attacker uses software that sequentially tries every possible password.

12
New cards

Dictionary attack

Attacker uses software that sequentially tries passwords based on words in a dictionary.

13
New cards

Phishing

Masqueraded emails or websites used to trick users.

14
New cards

Social engineering

Attempts to manipulate users, such as fraudulently acquiring passwords or credit card numbers.

15
New cards

Man-in-the-middle attack

Attacker sits between two communication endpoints and silently intercepts traffic.

16
New cards

Privilege escalation

Attacker becomes able to run code on your server as a privileged user.

17
New cards

Security through obscurity

Relying on the fact that attackers don't know something needed to harm you.

18
New cards

Principle of least privilege

Having just enough authority to get the job done and no more.

19
New cards

Sanitizing inputs

Encoding and filtering untrusted user input before accepting it into a trusted system.

20
New cards

Security audit

Series of checks and questions to assess the security of your system.