Lesson 11: Enhance Application Security Capabilities

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Secure Protocol

Communication rules that protect data by using encryption and authentication to keep it safe from hackers

  • Often more complex to implement

2
New cards

Insecure Protocols

Transmit data in clear text format, meaning anyone accessing the data packets can read any intercepted data sent over a network.

3
New cards

Transport Layer Security

A security tool that protects internet data by using encryption and certificates to keep communications private and secure.

4
New cards

Legacy TLS Versions:

TLS version 1.0 & 1.1

5
New cards

Legacy System before TLS:

SSL versions 2.0 & 3.0

6
New cards

Cipher Suites

A set of encryption tools that help a server and client securely connect and protect data during communication.

7
New cards

Secure Directory Services

Systems that safely store and manage user accounts and access permissions to control who can log in and use resources on a network.

8
New cards

What does a network directory store?

Details about users, devices, files, and what access each user or device has to those files.

9
New cards

Lightweight Directory Access Protocol (LDAP)

A protocol that lets systems find and manage user information, like usernames and passwords, from a central directory.

10
New cards

Simple Network Management Protocol (SNMP)

A protocol that helps monitor and manage network devices like routers and servers

11
New cards

Whats the most secure version of SNMP?

SNMPv3

12
New cards

File Transfer Protocol (FTP)

A protocol that lets computers send and receive files over a network,

13
New cards

Secure Shell (SSH)

A protocol that lets you securely connect to and control remote computers, usually over port 22.

14
New cards

Secure File Transfer Protocol (SFTP)

A secure way to transfer and manage files over a network by using encryption through SSH to keep the data safe.

15
New cards

File Transfer Protocol Secure (FTPS)

A secure version of FTP that uses TLS encryption to keep files and login details private during transfers.

16
New cards

Simple Mail Transfer Protocol (SMTP)

A protocol used to send emails between computers on the internet

17
New cards

Secure SMTP (SMTPS)

A secure version of SMTP that uses SSL/TLS encryption to protect emails during sending,

18
New cards

Post Office Protocol (POP)

A way to download emails from a server to your device, usually removing them from the server after.

  • POPS is the secure version

19
New cards

Internet Message Access Protocol (IMAP)

A protocol that lets you read and manage your emails directly on the mail server, so your messages stay synced across all your devices.

  • IMAPS is the secure version

20
New cards

Sender Policy Framework

A tool that helps stop fake emails by checking if the sender is allowed to send email from that domain.

21
New cards

DomainKeys Identified Mail (DKIM)

A tool that adds a digital signature to emails to prove they’re from the right sender and haven’t been changed along the way.

22
New cards

Domain-based Message Authentication, Reporting & Conformance (DMARC)

A tool that helps domain owners block fake emails and get reports about who’s sending emails using their domain.

23
New cards

Business Email Compromise (BEC) Attack

A scam where attackers use fake or hacked business emails to trick people

24
New cards

Secure/Multipurpose Internet Mail Extensions (S/MIME)

A tool that encrypts emails and adds a digital signature so only the right person can read them and be sure they came from you.

25
New cards

Data Loss Prevention (DLP)

A security tool that stops sensitive data from being shared or stored in the wrong places

26
New cards

Domain Name System Security Extensions (DNSSEC)

A security feature that makes sure DNS information is correct and hasn’t been tampered with, helping you safely reach real websites.

27
New cards

Code Signing

A way to prove software is from a trusted source and hasn’t been changed, using a digital signature

28
New cards

Static Code Analysis

A way to check code for mistakes or security issues without running it, helping fix problems early in development.

29
New cards

Dynamic Code Analysis

A way to test software while it’s running to find bugs or security issues that happen during execution.

30
New cards

Input Validation

A way to check and clean user input to make sure it's safe and in the right format before the app uses it.

31
New cards

Injection Attack

When hackers insert harmful code into an app’s input to steal data, take control, or break the system.

32
New cards

Data Exposure

When someone gets access to private or sensitive information because it wasn't properly protected.

33
New cards

Error Handling

How an app deals with problems so it doesn’t crash or expose sensitive info when something goes wrong.

34
New cards

Sandboxing

A way to run programs in a safe, separate space so they can’t harm the system or access anything they shouldn’t.