KK1 Physical & Software security controls
KK2 Software auditing and pen testing strategies
KK3 Types of software security and data security vulnerabilities
KK4 Web application risks XSS/SQL injections
KK8 Key legislation that affect collection, storage & communication data
100

A username and password to allow authorized access to a system

What is user authentication?

100

To review the software for compliance with specific standards.

What is software auditing?

100

When personal information is accessed, disclosed without authorisation, or is lost.

What are data breaches?

100

Unsecured web pages, web applications, and web servers running malicious Javascript code.

What is cross-site scripting?

100

Federal:

- Copyright Act 1968

- Privacy Act 1988


State:

- Privacy & Data Protection Act 2014

- Health Records Act 2001

What legislation are in Federal & State?

200

Are a category of software tools that help a software team manage changes to source code over time.

Developers upload the updates and changes they make to the source code of applications.

What are version control systems?

200

A simulated cyber attack against your computer system to check for exploitable vulnerabilities.

What is penetration testing?

200

Emails used for phishing scams

Breaches of Privacy Law (fines)

Unauthorized access to customer accounts

Loss of reputation with customers

Company collapse

What are the consequences for data breaches?

200

Allows dynamic and interactive content on HTML/CSS webpages

What is Javascript?

200

Recognizes that any original work is the property of the person who created it

What is the Copyright Act 1968?

300

Vulnerabilities to existing systems are constantly identified and a fix is created by the distributors of software.

What are software updates?

300

Data loss (crashing bugs)

Unauthorised access (lack of security)

Third party service goes offline

Compliance with tech standards

Privacy issues (is data protected?)

Legal issues (Copyright, Privacy)

Licensing (all parts licensed appropriately)

What risks could poorly/malicious code bring?

300

An attacker ‘spoofs’ an unsecured wifi network that a client connects too

All traffic can be analyzed by the attacker

What is a man-in-the-middle attack?

300

Sanitize/escape user input to remove special characters associated with JavaScript commands

How do you prevent cross-site scripting?

300

Rules for the collection, storage & communication of personal information

What is the Privacy Act 1988?

400

Encoding information so that is unreadable without the use of the encryption key.

What is encryption?

400

- uncover any issues or problems early; it is simpler and costs less to fix an issue earlier in the project

- improve preformance, scalability and reliability

- review any necessary or unnecessary testing

- ensure the application can be maintained and extended in the future

- make sure you use the apprpriate technology for the job

- satisfy legal and licensing requirements

what is the purpose of software auditing?

400

Tricking the victim into clicking 'accept' with admin permissions or into giving the attacker physical access to a device.

What is social engineering?

400

Running malicious SQL commands via unsensitized user input

Allows unauthorized users to add/modify/delete contents of the SQL database

What is an SQL injection?

400

Collection and handling of health information in public and private sector

What is the Health Records Act 2001?

500
  1. The receiver (Bob) generates a Public-Private key pair. 

  2. Bob gives the sender (Alice) his public key. Bob keeps his private key.

  3. Alice encrypts her data with Bob’s public key, and sends the encrypted data to Bob. 

  4. Bob uses his private key to decrypt the data.

What is Asymmetric Encryption?

500

Usernames / passwords

Personal information

Bank details

Credit card numbers

Health information

What information can be lost in a data breach?

500

Sanitise/escape user input to remove special characters associated with SQL commands

How do you prevent SQL injections?

500

Privacy Act equivalent for Victorian government agencies (vic roads, WorkSafe)

What is the Privacy and Data Protection Act 2014?