A loss of what is the unauthorized disclosure of info
Confidentiality
This is a wide used defense against intruders
Passwords or password system
what is the granting of a right or permission to a system entity to access a system resource.
Authorization
this is also referred to as single key encryption
asymmetric
Incorrect handling of program _____ is one of the most common failings in software security
Input
An example of what threat action is in which sensitive data are directly resealed to an unauthorized entity?
Exposure
This is the data structure that authorivately binds an indemnity & attributes to a token
Credential
what access control based on comparing security labels with security clearances.
MAC
The purpose of what is ro produce a fingerprint of a file message or block of data?
Hash Function
This refers to a wide variety of attacks based on the invalid handling of input data
Injection attacks
A what is a threat that if carried out and successful leads leads to an undesirable violation of security, or threat consequence
attack
An institution that issues debit cards to cardholders and is responsible for the cardholder’s account and authorizing transactions is the?
Issuer
The analogy of “who you are” + “what you’re doing” + “where/when you’re doing it” + “when you want to access it” is in reference to which access control that we learned about?
Attribute Based
Encryption protects against what kind of attacks?
Passive or eavesdropping
Improper Neutralization of Special Elements used in an SQL Command” is in which CWE Top 25 software error category?
Insecure Interaction between components
Usurpation
An organization can choose between a range of user authentication technologies based on a degree of what in the identity proofing and authentication processes.
confidence
The purpose of access control is to implement a security policy that limits access to who? given their ?
Authorized Users & Access Type
The Hash Property, Given only x, it must be hard to find y such that H(x) = H(y). This is known as?
second Preimage resistant
This is when multiple processes and threads compete to gain uncontrolled access to some resource.
Name 3 security principles
Economy of mech, fail safe defaults, complete mediation, open design, separation of privacy, least common mech, psychological acceptability Isolation, Encapsulation, Modularity, Layering, least astonishment
one of the simplest hardware tokens is a what device?
One time password
In RBAC what are the constraints?
Mutually exclusive roles, cardinality, prerequisites roles
protection against active attacks such as falsification is known as what?
Message Authentication
What are the categories of software security issues?
Insecure Interaction between components, Risky Resource Management, Porous Defenses