Module5(B)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/48

flashcard set

Earn XP

Description and Tags

This set of flashcards covers key concepts from Chapter 5, focusing on understanding and mitigating risks, threats, and vulnerabilities associated with websites.

Last updated 3:30 AM on 3/26/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

49 Terms

1
New cards

What is the primary learning objective of Chapter 5?

Identifying and mitigating web-related risks, threats, and vulnerabilities.

2
New cards

What types of traffic are analyzed for e-commerce websites?

Visitor location, visitor sources, visitor type, visitor navigation, average time on site, and leave rate.

3
New cards

What is Google Analytics commonly used for?

To analyze website traffic and visitor behavior.

4
New cards

What is a demographic profile based on?

Various criteria including age range, gender, marital status, geographical location, and occupation.

5
New cards

What interactive elements do websites use to engage visitors?

Forums, surveys, feedback forms, and emails.

6
New cards

What are the advantages of forums on websites?

Repeat visitors, increased keyword exposure, email address acquisition, demographic data gathering, and support for online relationships.

7
New cards

What is one disadvantage of maintaining a forum?

Requirement for technical expertise and content monitoring.

8
New cards

What type of form allows visitors to communicate feedback on a website?

Website feedback forms and online surveys.

9
New cards

What does OWASP stand for?

Open Web Application Security Project.

10
New cards

Name one of the OWASP Top 10 Threats.

Broken access control.

11
New cards

What is a mitigation strategy for cryptographic failures?

Encrypt sensitive data at rest and in transit.

12
New cards

What type of attack does SQL injection fall under?

Injection flaws.

13
New cards

What is meant by insecure design in web threats?

Omission or incorrect application of security measures.

14
New cards

How can security misconfigurations be mitigated?

Through security audits and training.

15
New cards

What is the impact of vulnerable and outdated components?

Increased risk due to lack of updates and vulnerability management.

16
New cards

What is the purpose of Multi-factor Authentication (MFA)?

To provide an additional layer of security during the authentication process.

17
New cards

How can logging failures be mitigated?

By ensuring critical actions and errors are logged properly.

18
New cards

What is Server-Side Request Forgery (SSRF)?

An attack that sends requests to unintended locations by manipulating server software.

19
New cards

What are some common web threats not included in the OWASP Top 10?

Information leakage and improper error handling.

20
New cards

What is the danger of unsecure communications?

Susceptibility to data theft and other forms of tampering.

21
New cards

How can unauthorized URL access be restricted?

By implementing access control for each function.

22
New cards

What kind of attacks fall under client-side attacks?

Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks.

23
New cards

What are some best practices to mitigate web attacks?

Deploy encryption strategies and user education.

24
New cards

What does the leave (bounce) rate indicate?

The percentage of visitors who leave the site after viewing only one page.

25
New cards

What is a customer profile?

A description of your customer based on various criteria guiding site design.

26
New cards

How can feedback from visitors be effectively gathered through surveys?

By making them brief and focused on eliciting useful information.

27
New cards

What is the risk involved in allowing user comments on a website?

Phishing, bullying, and cyberstalking.

28
New cards

What is a common characteristic to assess when analyzing website traffic?

Visitor navigation patterns.

29
New cards

How can security measures be incorporated during a website's design phase?

By planning for security from the outset to mitigate risks.

30
New cards

What is the principle of least privilege?

Limiting access rights for users to the bare minimum they need to perform their job.

31
New cards

What should be tracked as part of maintaining secure software components?

Installed software versions and dependencies.

32
New cards

How can suspicious activities on a website be detected?

Through effective monitoring and notification procedures.

33
New cards

What is a common tool used for web analytics besides Google Analytics?

Map Overlays.

34
New cards

What does failing to restrict URL access lead to?

Hidden URLs and exposure to sensitive data.

35
New cards

What should a comprehensive security strategy include?

General network security procedures and user education.

36
New cards

Why is it important to implement patch management processes?

To keep systems up-to-date and secure from known vulnerabilities.

37
New cards

What is the use of digital signatures in software updates?

To ensure the update is from the expected source and has not been tampered with.

38
New cards

What does encryption protect in web security?

Sensitive data at rest and in transit.

39
New cards

What are

Mitigation strategies and defenses implemented to protect against web threats.

40
New cards

What are some threats to user data on websites?

Phishing, data breaches, and inadequate encryption.

41
New cards

What is the purpose of website analytics?

To gather insights on visitor behavior and improve user experience.

42
New cards

Define 'online privacy'.

The right of individuals to control how their personal information is collected and used online.

43
New cards

What role do cookies play in web analytics?

Cookies track user activity on a website to gather data for analytics.

44
New cards

What is a DDoS attack?

Distributed Denial of Service attack that aims to overwhelm a website with traffic.

45
New cards

What is HTTPS?

Hypertext Transfer Protocol Secure, a secure version of HTTP that encrypts data exchanged between users and websites.

46
New cards

Name a method to enhance online security for users.

Two-factor authentication (2FA) is a method that adds an extra layer of security by requiring two forms of identification.

47
New cards

What is meant by data encryption?

The process of converting sensitive information into a code to prevent unauthorized access.

48
New cards

What does vulnerability assessment involve?

Identifying, quantifying, and prioritizing vulnerabilities in a system.

49
New cards

What is the role of a Content Delivery Network (CDN) in web performance?

A CDN caches content at multiple locations around the globe to improve loading speeds and reduce latency.

Explore top notes

note
Science - Chapter 8
Updated 1058d ago
0.0(0)
note
Risk / Riesgo (IT)
Updated 1245d ago
0.0(0)
note
Chemistry Chapter 3
Updated 426d ago
0.0(0)
note
B1
Updated 1268d ago
0.0(0)
note
Body Disorders
Updated 1154d ago
0.0(0)
note
Conformity
Updated 1037d ago
0.0(0)
note
Impacts of Urbanization
Updated 1164d ago
0.0(0)
note
Science - Chapter 8
Updated 1058d ago
0.0(0)
note
Risk / Riesgo (IT)
Updated 1245d ago
0.0(0)
note
Chemistry Chapter 3
Updated 426d ago
0.0(0)
note
B1
Updated 1268d ago
0.0(0)
note
Body Disorders
Updated 1154d ago
0.0(0)
note
Conformity
Updated 1037d ago
0.0(0)
note
Impacts of Urbanization
Updated 1164d ago
0.0(0)

Explore top flashcards

flashcards
Camping Vocab
44
Updated 564d ago
0.0(0)
flashcards
Chemistry Unit 8 Ions
56
Updated 1117d ago
0.0(0)
flashcards
APUSH Vocab Quiz
30
Updated 1098d ago
0.0(0)
flashcards
Russia - APCG
47
Updated 1234d ago
0.0(0)
flashcards
Bio evolution test
41
Updated 12d ago
0.0(0)
flashcards
Genetics E1- Medical Pedigree
34
Updated 286d ago
0.0(0)
flashcards
Camping Vocab
44
Updated 564d ago
0.0(0)
flashcards
Chemistry Unit 8 Ions
56
Updated 1117d ago
0.0(0)
flashcards
APUSH Vocab Quiz
30
Updated 1098d ago
0.0(0)
flashcards
Russia - APCG
47
Updated 1234d ago
0.0(0)
flashcards
Bio evolution test
41
Updated 12d ago
0.0(0)
flashcards
Genetics E1- Medical Pedigree
34
Updated 286d ago
0.0(0)