Software Security - Week 11

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Flashcards for reviewing Software Security concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Security Testing

A process used to identify vulnerabilities, weaknesses, and potential threats in software systems, networks, or applications.

2
New cards

Assets to Protect

Applications, data, servers, APIs, user credentials, etc.

3
New cards

Threats

Potential attacks.

4
New cards

Vulnerabilities

System flaws that can be exploited.

5
New cards

Risk

Threat x Vulnerability x Impact

6
New cards

Remediation

Fixing vulnerabilities through patching, configuration, or mitigation.

7
New cards

Confidentiality

Ensuring data is not disclosed to unauthorized individuals or systems.

8
New cards

Integrity

Maintaining the accuracy and completeness of data.

9
New cards

Authentication

Verifying the identity of users, devices, or processes.

10
New cards

Authorization

Granting or denying access rights and permissions to resources.

11
New cards

Availability

Ensuring that systems and data are accessible when needed.

12
New cards

Non-repudiation

Providing undeniable proof of actions or events.

13
New cards

Vulnerability Scanning

Automated software scanning for known vulnerability signatures.

14
New cards

Security Scanning

Identifying network and system weaknesses and providing solutions.

15
New cards

Penetration Testing

Simulating an attack from a malicious hacker to find potential vulnerabilities.

16
New cards

Risk Assessment

Analyzing security risks and recommending controls and measures.

17
New cards

Security Auditing

An internal inspection of applications and operating systems for security flaws.

18
New cards

Ethical Hacking

Hacking an organization's software systems to expose security flaws.

19
New cards

Posture Assessment

Combining security scanning, ethical hacking, and risk assessments to show an overall security posture.

20
New cards

Black Box Testing

Testing functionality without knowledge of internal code.