Secure Programming - CSS-2751

0.0(0)
studied byStudied by 0 people
0.0(0)
linked notesView linked note
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/11

flashcard set

Earn XP

Description and Tags

A collection of vocabulary flashcards based on the lecture notes for Secure Programming CSS-2751.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Buffer Overflow

A memory management failure where data overflows a segment and overwrites other sections, potentially allowing attackers to execute malicious code.

2
New cards

Code Injection

The insertion of additional code into an application via unsanitized input, which alters application behavior and can lead to unauthorized actions.

3
New cards

Input Validation

The process of verifying user-provided input for compliance with expected data types, done through whitelisting or blacklisting.

4
New cards

Input Sanitization

The process of cleaning user input to prevent harmful commands, such as removing special characters before processing.

5
New cards

Static Analysis

Analysis of source code or compiled code to find coding mistakes without executing the program.

6
New cards

Dynamic Analysis

Testing methods applied to an actively running program or device to examine its behavior.

7
New cards

Fuzzing

An automated testing technique that feeds random or invalid input to a device to uncover crashes or exploits.

8
New cards

Black-Box Testing

A testing method where the tester does not have access to internal workings of a system and tests the outputs based on known inputs.

9
New cards

White-Box Testing

A testing approach where the tester has full knowledge of the internal structure, source code, and workings of the system being tested.

10
New cards

Bug Bounties

Programs offered by companies where ethical hackers report discovered exploits for rewards.

11
New cards

Defense In Depth

A layered security strategy that ensures protection remains even if one layer fails.

12
New cards

Security by Design

The principle of designing software with security in mind from the outset, emphasizing readable code, secure components, and proactive measures.