Uses a username and password to allow authorised access to a system
What is User Authentication?
Uses to audit (check/review/test) code written locally, or obtained from an online source
What is software auditing?
When personal information is accessed, disclosed without authorisation, or is lost.
What is data breaches?
Running malicious SQL commands via unsanitised user input to allow unauthorised users to add/modify/delete contents of the SQL database.
What is SQL injections?
Uses to preserve old versions of software to be rolled back if required
What is version control?
What is malicious or poorly code?
Emails might be used for phishing scams and unauthorised access ot customer accounts.
What are some consequences of data breaches?
Sanitise/escape user input to remove special characters/delimiters associated with SQL commands to perform immediate actions on the SQLdatabase.
What can you do to prevent SQL injections?
Uses to cypher text messages
What is Encryption?
Uses to simulate a cyber attack agaisnt the computer system to check for vulnerabilities
What is penetration testing?
An attacker interferes an electronical communication and pretends to be the client or the supplier to collect data from the other.
What is a man-in-the-middle attack?
Malicious unsanitised code sent from the client to the server via user input is executed on the server and then displayed to the user
What is XSS scripting?
Uses to fix errors and improve performance
What is software update?
Update the anti-virus software to be up-to-date.
What is a method of reducing risk before downloading a module?
Manipulation of the weakest link in a computer system
Allows dynamic and interactive content on HTML/CSS webpages.
What is Javascript?
Uses to protect the software from virus
What is firewalls and system protection?
A method of testing the behaviour of algorithms in pseudocode.
What is trace tables?
Consider increasing password length and complexity requirements.
What is a strategy to prevent man-in-the-middle-attack?
Sanitise/escape user input to remove special characters and delimiters associated with JavaScript/XSS commands.
What can you do to prevent Javascript/XSS scripting?