General
Security Control
Software Auditing
Software Security and Data Security Vulnerability
Web Application Risks
100

Programs that are developed by companies other than the company that developed the computer's operating system.

What is third-party software


100

Locked Doors, Barred windows and restricted areas

What is barrier techniques


100

Main goal of Software Auditing

What is minimising risk


100

When personal information is accessed, disclosed without authorisation, or is lost


What is a Data Breach


100

Input of SQL code in a database to maliciously affect it

What is an SQL injection attack

200

To complete work to the best of your ability

Ethical Reponsiblility

200

The software and procedures used to assist in the protection of information systems and the files created, communicated and stored by individuals and organisations

Software security controls

200

Identifying security vulnerabilities in web applications by challenging every page and line of code in the application for known weaknesses

What is Penetration testing (Pen Test)

200

An attack 'spoofs' an unsecured wifi network that a client connects too

What is a Man-in-the-middle attack

200

Input of Javascript into vulnerable websites to malicious affects it

What is a Cross-Site Scripting (XSS) attack?

300

-Accuracy 

- Authenticity 

- Correctness

- Reasonableness

-Relevance

- Timeliness

Are characteristics of What?

Of Data that has integrity

300
Software tools that help a software team manage changes to source code over time

Version control

300

Poorley coded or malicious code that causes the following:

- Data loss 

- Unauthorised access

- Third party services goes offline

- Compliance with tech standard

- Privacy issues

- Legal issues

300

Manipulation of a victim to provide personal information or to initiate a transaction

What is Social Engineering


300

Technique that involves overwhelming a web server with flood of traffic, causing it to crash or become unresponsive

Distributed Denial of Service (DDoS) attack

400

Encoding information so that is unreadable without the use of a key

Encryptio 

400

A Malware that requires users to transport it from one computer to another?

What is a Worm