Request Forgery + Application Resilience + Buffer Overflows

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/5

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

6 Terms

1
New cards

Request forgery

attacks exploit trust relationships and attempt to have users unwittingly execute commands against a remote server

2
New cards

XSRF

attacks work by making the reasonable assumption that users are often logged into many different websites at the same time. Attacks then embed code in one website that sends a command to a second website

3
New cards

SSRF

attacks exploit a similar vulnerability but instead of tricking a user’s browser into visiting a URL, they trick a server into visiting a URL based on user-supplied input

4
New cards

Scalability

says that applications should be designed so that computing resources they require may be incrementally added to support increasing demand

5
New cards

Elasticity

goes a step further than scalability and says that applications should be able to provision resources automatically to scale when necessary and then automatically deprovision those resources to reduce capacity (and cost) when it is no longer needed

6
New cards

Buffer overflow

attacks occur when an attacker manipulates a program into placing more data into an area of memory than is allocated for that program’s use. The goal is to overwrite other information in memory with instructions that may be executed by a different process running on the system