1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Request forgery
attacks exploit trust relationships and attempt to have users unwittingly execute commands against a remote server
XSRF
attacks work by making the reasonable assumption that users are often logged into many different websites at the same time. Attacks then embed code in one website that sends a command to a second website
SSRF
attacks exploit a similar vulnerability but instead of tricking a user’s browser into visiting a URL, they trick a server into visiting a URL based on user-supplied input
Scalability
says that applications should be designed so that computing resources they require may be incrementally added to support increasing demand
Elasticity
goes a step further than scalability and says that applications should be able to provision resources automatically to scale when necessary and then automatically deprovision those resources to reduce capacity (and cost) when it is no longer needed
Buffer overflow
attacks occur when an attacker manipulates a program into placing more data into an area of memory than is allocated for that program’s use. The goal is to overwrite other information in memory with instructions that may be executed by a different process running on the system