Uses a username and password to allow authorised access to a system
What is user authentication
Poorly coded or malicious code that causes the following:
What is Risk?
Unsecured web pages, web applications, and web servers running malicious Javascript code
What is Cross-site scripting?
When personal information is accessed, disclosed without authorisation, or is lost.
What is Data breaches?
Refers to programs that are developed by companies other than the company that developed the computer's operating system.
What is Third Party program
a category of software tools that help a software team manage changes to source code over time.
What is version control?
A simulated cyber attack against your computer system to check for exploitable vulnerabilities
What is Penetration Testing?
Allows dynamic and interactive content on HTML/CSS webpages 97% of websites used it
What is Javascript?
An attacker ‘spoofs’ an unsecured wifi network that a client connects too
What is Man-in-the-middle attacks?
Security vulnerability
High battery usage
Privacy issues
What is risk
To confirm a user is allowed to access a resource
What is User authentication?
Review the interaction between modules within the software, e.g login, saving, data manipulation
What is Software Auditing?
user input to remove special characters associated with JavaScript commands
What is Sanitise/escape?
Manipulation of the weakest link in a computer system
What is Social Engineering?
Delete the third party software
Get another third party
Stop software from running automatically at startup
What is Manage the risks
information so that is unreadable without the use of the encryption key
What is Encryption?
Copyright, Privacy
What is Legal issues?
Running malicious sql commands via unsanitized user input
What is SQL Injection?
the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
What is phishing?
user data transferred without their knowledge
What is Privacy issues?
Public-Private Key pair
What is Asymmetric encryption?
lack of security
What is Unauthorised access?
Sanitise/escape user input to remove special characters associated with SQL commands
What is prevention
Unauthorized access to customer accounts
Loss of reputation with customers
What is Consequences?