1/20
These flashcards cover key concepts related to web development and security, including web applications, security risks, user access, and reactive measures against attacks.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Web Applications
Applications that run on web servers and can include e-commerce, social networks, and online banking.
Static Website
A web page or site that delivers the same content to every visitor and does not require users to log in.
Dynamic Web App
Web applications that allow two-way information flow, requiring user authentication and enabling content submission.
Common Web App Functions
Typical uses of web applications including shopping, social networking, banking, web search, and more.
Cloud Services
Internal web applications such as HR systems, collaboration software, and email web interfaces.
Web App Security
The protection measures taken to guard sensitive data and prevent attackers from gaining access to backend systems.
OWASP Mobile Top 10 Risks
A list of common vulnerabilities in mobile applications, including weak server-side controls and poor authorization.
Input Validation
The practice of ensuring that incoming data is correct and safe to process, often the first line of defense against attacks.
Arbitrary Input
Data that a user can submit, which may include invalid or malicious information.
Access Control
The process of determining permissions for users and defining what resources they can access within an application.
Authentication
The process of verifying the identity of a user, traditionally using usernames and passwords.
Session Management
The handling of user sessions to maintain state across multiple requests and provide secure access control.
Boundary Validation
A security practice that entails validating data at defined trust boundaries between trusted and untrusted zones.
Sanitization
The process of modifying input data to make it safe for processing and prevent harmful data from being executed.
Multistep Validation
A security approach involving multiple layers of checks to ensure data integrity and safety.
Canonicalization
The process of converting data into a standard format to ensure accurate validation and processing.
Web Application Firewall (WAF)
A security tool that monitors and filters HTTP traffic to and from a web application.
Reacting to Attacks
Defensive strategies that include slowing response times and terminating sessions of suspicious activities.
Logging and Monitoring
The practice of recording access and system operations to track user activities and detect anomalies.
Error Handling
The methods used to inform users of issues without revealing sensitive information that could aid attackers.
Firewalls
Network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules.