SWE210 Software Security Week 4

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

flashcard set

Earn XP

Description and Tags

A set of 25 vocabulary flashcards covering key concepts related to SQL injection, security vulnerabilities, and preventative measures.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

Command Injection Attack

A type of security vulnerability that occurs when an attacker executes arbitrary commands on a target system.

2
New cards

SQL Injection (SQLi)

A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database.

3
New cards

Prepared Statements

A method to prevent SQL injection by separating SQL logic from user input.

4
New cards

UNION Attack

A type of SQL injection that retrieves data from multiple database tables by appending results to the original query.

5
New cards

Tautology Attack

A type of SQL injection where an attacker injects a payload that always evaluates to true.

6
New cards

LDAP Injection

A vulnerability that allows an attacker to manipulate an LDAP query to gain unauthorized access or information.

7
New cards

FTP Injection

A security vulnerability that occurs when unauthorized FTP commands are sent by an attacker.

8
New cards

Comment Attack

An attack that utilizes SQL comments to manipulate the logic of an SQL query.

9
New cards

SQL

Structured Query Language, a domain-specific programming language for managing and manipulating relational databases.

10
New cards

Command-Line

A user interface where users type commands to an interpreter which executes them.

11
New cards

SQL Query

A statement used to perform operations on data within a database, such as retrieving or modifying data.

12
New cards

Vulnerable Input

Input from users that has not been properly sanitized or validated, posing a risk of SQL injection.

13
New cards

Relational Database

A type of database that stores data in tables and allows relationships between the data.

14
New cards

Injection Point

The location in code where an attacker can insert malicious input to affect the execution of a query.

15
New cards

Stacked Queries

Another term for additional statement injection; allows multiple SQL statements in a single input.

16
New cards

LDAP Protocol

Lightweight Directory Access Protocol, used for querying user information in directories.

17
New cards

Malicious SQL Query

An SQL command crafted by an attacker to manipulate or disrupt normal database operations.

18
New cards

User Input Handling

The process of managing user input to ensure it is handled securely and does not introduce vulnerabilities.

19
New cards

Data Exfiltration

The unauthorized transfer of data from a computer or network.

20
New cards

Parameterization

A practice in SQL that helps protect against SQL injection by using parameters in queries.

21
New cards

Sanitization

The process of cleaning and validating user input to prevent malicious data from being processed.

22
New cards

Server-side Validation

Validation of input performed on the server before processing to enhance security.

23
New cards

Database Permissions

Grants that control access levels and privileges a user has in regards to the database.

24
New cards

Command-Line Interpreter

A tool that executes commands entered by a user in a command-line interface.

25
New cards

SQL Filter

Conditions applied in SQL queries to limit the records returned based on specified criteria.

26
New cards

Arbitrary Commands

Commands that are not restricted by the application's logic, allowing attackers to execute anything.

27
New cards

Input Validation & Whitelisting

A mitigation strategy that ensures only acceptable inputs are processed.