Application Security Lecture Review

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

A set of vocabulary flashcards based on key concepts discussed in the Application Security lecture.

Last updated 10:20 PM on 4/6/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

Availability

Ensures that programs, data, processing, and resources are accessible when needed.

2
New cards

Integrity

Maintains the accuracy and trustworthiness of data and systems.

3
New cards

Confidentiality

Protects sensitive information from unauthorized access and disclosure.

4
New cards

Database Management System (DBMS)

Software used to manage databases, ensuring data integrity, security, and accessibility.

5
New cards

Transaction Persistence

Ensures that completed transactions are stored permanently in the database.

6
New cards

Denial of Service (DoS)

An attack that restricts legitimate users from accessing services by overwhelming resources.

7
New cards

ACID Test

A set of properties (Atomicity, Consistency, Isolation, Durability) that guarantee reliable transaction processing.

8
New cards

Buffer Overflow

A vulnerability where excess input data overflows into adjacent memory, potentially leading to exploits.

9
New cards

Malware

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

10
New cards

SQL Injection

A code injection technique that allows attackers to execute malicious SQL statements.

11
New cards

Change Management

A process to ensure that changes to a system are introduced in a controlled and coordinated manner.

12
New cards

Object Reuse

The risk that an object might contain residual sensitive data after its previous use.

13
New cards

Logic Bomb

Malicious code triggered under specific conditions, often secretly embedded in a system.

14
New cards

Spyware

Software that collects user information without their consent, often bundled with other software.

15
New cards

Botnets

Networks of infected computers controlled remotely to carry out malicious activities like DDoS attacks.

16
New cards

Isolation (in Acidity)

Ensures that transaction results are not visible until all processes are complete.

17
New cards

Garbage Collection

The de-allocation of storage after program execution to prevent sensitive data leakage.

18
New cards

Access Controls

Mechanisms that restrict access to authorized users only.

Explore top notes

note
PATHOLOGY
Updated 1126d ago
0.0(0)
note
Invisible Man Chapter 20
Updated 1194d ago
0.0(0)
note
Of Tests and Testing
Updated 1226d ago
0.0(0)
note
World: Political Systems
Updated 1229d ago
0.0(0)
note
PATHOLOGY
Updated 1126d ago
0.0(0)
note
Invisible Man Chapter 20
Updated 1194d ago
0.0(0)
note
Of Tests and Testing
Updated 1226d ago
0.0(0)
note
World: Political Systems
Updated 1229d ago
0.0(0)

Explore top flashcards

flashcards
3.4: donner une instruction
36
Updated 707d ago
0.0(0)
flashcards
topic 1.1
32
Updated 1206d ago
0.0(0)
flashcards
Belangrijksten Heiligen A-Z
50
Updated 119d ago
0.0(0)
flashcards
Neurons PNS and CNS
36
Updated 902d ago
0.0(0)
flashcards
Conrad JROTC ACP SY 25-26
100
Updated 115d ago
0.0(0)
flashcards
3.4: donner une instruction
36
Updated 707d ago
0.0(0)
flashcards
topic 1.1
32
Updated 1206d ago
0.0(0)
flashcards
Belangrijksten Heiligen A-Z
50
Updated 119d ago
0.0(0)
flashcards
Neurons PNS and CNS
36
Updated 902d ago
0.0(0)
flashcards
Conrad JROTC ACP SY 25-26
100
Updated 115d ago
0.0(0)