Lec 6 Data Validation

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:31 PM on 3/31/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

51 Terms

1
New cards

Data Validation

Process of minimizing malformed data from entering the system

2
New cards

Data Validation

Ensures that the application is robust against all forms of input data, whether obtained from the user, infrastructure, external entities or database systems

3
New cards

Failure to properly validate input

Data Validation: Most common web application security weakness is the _____ from the client or environment

4
New cards

Failure to properly validate input

Data Validation: Leads to almost all of the major vulnerabilities in applications, such as Interpreter Injection

5
New cards

Should never be trusted

Data Validation: Data from the client _____ for the client has every possibility to tamper with the data

6
New cards

Data Validation

Should be applied to all input data, at minimum

7
New cards

Allowed set of characters

Data Validation: Define the _____ to be accepted

8
New cards

Minimum and maximum

Data Validation: Defines a _____ length for the data (e.g. {1,25}).

9
New cards

Performed on the server

Data Validation: Ensure that any input validation performed on the client is also _____

10
New cards

Not

Data Validation Components: Data validation is _____ the primary method of preventing XSS, SQL Injection

11
New cards

Tampered with

Data Validation Components: Ensure that the data has not been _____ and is the same as before

12
New cards

Business rules

Data Validation Components: Ensure that data is not only validated, but _____ is/are correct. e.g. Interest rates fall within permitted boundaries

13
New cards

Strongly typed

Data Validation Components: Ensure that the data is _____, correct syntax, within length boundaries, contains only permitted characters, or that numbers are correctly signed and within range boundaries

14
New cards

Correct syntax

Data Validation Components: Ensure that the data is strongly typed, _____, within length boundaries, contains only permitted characters, or that numbers are correctly signed and within range boundaries

15
New cards

Within length boundaries

Data Validation Components: Ensure that the data is strongly typed, correct syntax, _____, contains only permitted characters, or that numbers are correctly signed and within range boundaries

16
New cards

Contains only permitted characters

Data Validation Components: Ensure that the data is strongly typed, correct syntax, within length boundaries, _____, or that numbers are correctly signed and within range boundaries

17
New cards

Numbers are correctly signed and within range boundaries

Data Validation Components: Ensure that the data is strongly typed, correct syntax, within length boundaries, contains only permitted characters, or that _____

18
New cards

Be included wherever data passes

Integrity Checks: Integrity checks must _____ from a trusted to a less trusted boundary

19
New cards

Application to client browser

Integrity Checks: Data passes from _____ in a hidden field

20
New cards

Third-party payment gateway

Integrity Checks: Data passes to _____, such as a transaction ID used internally upon return

21
New cards

Performed on every tier

Validation: Validation must be _____

22
New cards

Per the function

Validation: Validation should be performed as _____ of the server executing the code

23
New cards

Web/presentation tier

Validation: The _____ should validate for web related issues

24
New cards

Persistence layers

_____ should validate for persistence issues such as SQL injection

25
New cards

Business Rules

Known during design, and they influence implementation

26
New cards

Simplest

Business Rules: There are good, bad, and ā€œbestā€ approaches to business rules. Often the best approach is the _____ in terms of code.

27
New cards

Data Validation Strategies

Accept Known Good, Reject Known Bad, Sanitize, No Validation

28
New cards

Accept Known Good

Data Validation Strategies: Also known as ā€œwhitelistā€ or ā€œpositiveā€ validation

29
New cards

Reject Known Bad

Data Validation Strategies: Also known as ā€œnegativeā€ or ā€œblacklistā€ validation

30
New cards

Sanitize

Data Validation Strategies: Rather than accept or reject input, another option is to change the user input into an acceptable format

31
New cards

No Validation

Data Validation Strategies: Unsafe and strongly discouraged

32
New cards

No Validation

Data Validation Strategies: Leads to direct elimination of application, host and network security controls

33
New cards

White List Validation

Recommended to prevent attacks as early as possible in the processing of the user’s (attacker’s) request

34
New cards

White List Validation

Usually based on regular expressions

35
New cards

Filename uses an expected extension

Upload Verification: Use input validation to ensure the uploaded _____ type

36
New cards

Defined maximum file size

Upload Verification: Ensure the uploaded file is not larger than a _____

37
New cards

Verify the image is valid

Upload Verification: Use image rewriting libraries to _____ and to strip away extraneous content

38
New cards

Set the extension of the stored image

Upload Verification: _____ to be a valid image extension based on the detected content type of the image from image processing

39
New cards

Within a list of defined image types

Upload Verification: Ensure the detected content type of the image is _____

40
New cards

New filename

Upload Storage: Use a _____ to store the file on the OS

41
New cards

User-controlled text

Upload Storage: Do not use any _____ for this filename or for the temporary filename

42
New cards

Analyzed

Upload Storage: Uploaded files should be _____ for malicious content

43
New cards

Correct content-type

Public Serving of Uploaded Content: Ensure uploaded images are served with the _____

44
New cards

@

Email Validation Basics: Check for presence of at least one _____ symbol in the address

45
New cards

64

Email Validation Basics: Ensure the local-part is no longer than _____ octets

46
New cards

Deliverable

Email Validation Basics: Ensure the address is

47
New cards

255

Email Validation Basics: Ensure the domain is no longer than _____ octets

48
New cards

Case-sensitive in the local portion

Email Validation Basics: A mailbox address must be _____ of the address (left of the rightmost @ character)

49
New cards

Non-alphanumeric characters

Email Validation Basics: A mailbox address must have _____ in the local-part

50
New cards

Zero or more

Email Validation Basics: A mailbox address must have _____ labels

51
New cards

Data Validation Components

Validation, Integrity Checks, Business Rules

Explore top notes

note
Ap Human Georgaphy
Updated 1064d ago
0.0(0)
note
Summary: Arctic and Antartic
Updated 1225d ago
0.0(0)
note
Chp 15: Delivery
Updated 1183d ago
0.0(0)
note
Unit 4 - Chapter 16
Updated 916d ago
0.0(0)
note
Microbiomes
Updated 1336d ago
0.0(0)
note
IB PHYSICS Option D: Astrophysics
Updated 598d ago
0.0(0)
note
Ap Human Georgaphy
Updated 1064d ago
0.0(0)
note
Summary: Arctic and Antartic
Updated 1225d ago
0.0(0)
note
Chp 15: Delivery
Updated 1183d ago
0.0(0)
note
Unit 4 - Chapter 16
Updated 916d ago
0.0(0)
note
Microbiomes
Updated 1336d ago
0.0(0)
note
IB PHYSICS Option D: Astrophysics
Updated 598d ago
0.0(0)

Explore top flashcards

flashcards
HP - Muscle groups
28
Updated 782d ago
0.0(0)
flashcards
Cells and Cell Functions
32
Updated 1298d ago
0.0(0)
flashcards
Circulatory System
37
Updated 1059d ago
0.0(0)
flashcards
Geography 2
91
Updated 386d ago
0.0(0)
flashcards
EM E2: Infectious Disease
87
Updated 342d ago
0.0(0)
flashcards
Geo5 Final
132
Updated 1219d ago
0.0(0)
flashcards
HP - Muscle groups
28
Updated 782d ago
0.0(0)
flashcards
Cells and Cell Functions
32
Updated 1298d ago
0.0(0)
flashcards
Circulatory System
37
Updated 1059d ago
0.0(0)
flashcards
Geography 2
91
Updated 386d ago
0.0(0)
flashcards
EM E2: Infectious Disease
87
Updated 342d ago
0.0(0)
flashcards
Geo5 Final
132
Updated 1219d ago
0.0(0)