ITEC 100- WEEK 7

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

involves detecting and

fixing vulnerabilities in

application software to

protect against

unauthorized access,

alterations, or misuse.

Application security

2
New cards

a user can be authorized to access an application by verifying their identity against a list of approved users.

Authorization

3
New cards

Additional security measures protect sensitive data from cybercriminals

even after user verification. In cloud- based applications, encrypting data during transmission ensures its safety.

Encryption

4
New cards

If a security breach occurs in an

application,_______ can assist in

determining who gained access to

the data and how they did so.

Application log files keep track of

which parts of the application have

been accessed and by whom.

logging

5
New cards

A method that ensures that all of

these security controls are

functioning effectively.

Application Testing

6
New cards

detects code flaws by analyzing source files to identify

root causes. Comparing scan results with real-time solutions

accelerates issue detection, reduces MTTR, and supports

collaborative troubleshooting.

Static Application Security Testing (SAST)

7
New cards

proactively simulates security breaches on live applications

to identify exploitable flaws, making it effective for detecting

runtime and environment-related errors.

Dynamic Application Security Testing (DAST)

8
New cards

combines SAST and DAST by analyzing applications in real-

time during development or production. With access to all code

and components, it provides more accurate and detailed results.

Interactive Application Security Testing (IAST)

9
New cards

focuses on security within applications, providing

continuous monitoring and automatic responses to threats, such

as ending sessions and notifying IT teams.

Run-time Application Security Protection (RASP)

10
New cards

The architecture and design

of the application can be

examined for

security flaws before code

is created. The construction

of a threat model is

a popular strategy used at

this phase.

Design Review

11
New cards

A security engineer delves

into the application by

manually inspecting the

source code and looking for

security issues.

Vulnerabilities unique to the

application can be discovered

through understanding the

application.

White-box Security Review or Code Review

12
New cards

This is accomplished solely

through the use of an

application to test it for

security flaws; no source

code is necessary.

Black-box Security Audit

13
New cards

Many security tools can be

automated by including them

in the development or testing

process. Automated

DAST/SAST tools that are

incorporated into code

editors or CI/CD systems are

examples.

Automated Tooling

14
New cards

Many websites and software providers offer hacker-powered application security solutions through which individuals can be

recognized and compensated for reporting defects.

Coordinated Vulnerability Platform

15
New cards

It allows an attacker to insert client-side code into a webpage.

This gives the attacker direct access to the user's sensitive

information.

Cross-Site Scripting (XSS)

16
New cards

Attacks to flood a targeted server or the infrastructure that

supports it with various types of traffic. This illegitimate traffic

eventually prevents legitimate users from accessing the server,

causing it to shut down.

Distributed denial- of-service (DDoS)

17
New cards

It is a technique used by hackers to exploit database flaws.

SQL injection (SQLi)

18
New cards

To mimic authorized users after duping them into submitting an

authorization request. Since their accounts have additional

permissions, high-level users are obviously frequent targets of

this strategy, and once the account is compromised, the attacker

can remove, change, or destroy data.

Cross-Site Request Forgery (CSRF)

19
New cards

It occurs when bad actors execute a variety of attacks on an

application, they end up unintentionally changing some area of its

memory. As a result, the software exhibits unexpected behavior or

fails.

Memory corruption

20
New cards

It occurs when malicious code is injected into the system's

designated memory region. Overflowing the buffer zone's capacity

causes surrounding areas of the application's memory to be

overwritten with data, posing a security risk.

Buffer Overflow

21
New cards

is a security measure that prevents

unauthorized applications from running in ways that could

compromise data safety.

Application control

22
New cards

controls ensure records processing from initiation to completion

Completeness checks

23
New cards

controls ensure only valid data is input or processed

Validity checks

24
New cards

controls ensure unique, irrefutable identification of all users

Identification

25
New cards

controls provide an application system authentication mechanism

Authentication

26
New cards

controls ensure access to the application system

by approved business users only

Authorization

27
New cards

controls ensure data integrity feeds into the

application system from upstream sources

Input controls

28
New cards

controls ensure scientifically and

mathematically correct data, based on inputs and outputs

Forensic controls