Key Web Application Risks: OWASP Security Flashcards

Table of Contents

OWASP Security Flashcards

What does OWASP stand for?   drill owasp_security

Front

What does OWASP stand for?

Back

Open Web Application Security Project

What is the OWASP Top 10?   drill owasp_security

Front

What is the OWASP Top 10?

Back

A regularly updated report outlining the most critical web application security risks

Injection   drill owasp_security

Front

Describe the OWASP category: Injection

Back

Untrusted data is sent to an interpreter as part of a command or query, tricking it into executing unintended commands or accessing unauthorized data

Broken Authentication   drill owasp_security

Front

What is Broken Authentication in the context of OWASP?

Back

Weaknesses in authentication and session management that allow attackers to compromise passwords, keys, or session tokens

Sensitive Data Exposure   drill owasp_security

Front

Explain Sensitive Data Exposure as defined by OWASP

Back

Failure to properly protect sensitive information such as financial data, healthcare information, or personally identifiable information (PII)

XML External Entities (XXE)   drill owasp_security

Front

What is the XML External Entities (XXE) vulnerability?

Back

An attack against an application that parses XML input, where external entities can be used to disclose internal files or perform server-side request forgery

Broken Access Control   drill owasp_security

Front

Define Broken Access Control in OWASP terms

Back

Restrictions on what authenticated users are allowed to do are not properly enforced, leading to unauthorized information disclosure, modification, or destruction

Security Misconfiguration   drill owasp_security

Front

What does Security Misconfiguration refer to in OWASP?

Back

Insecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, and verbose error messages containing sensitive information

Cross-Site Scripting (XSS)   drill owasp_security

Front

Explain Cross-Site Scripting (XSS)

Back

A vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users, potentially stealing session cookies or redirecting users to malicious sites

Insecure Deserialization   drill owasp_security

Front

What is Insecure Deserialization?

Back

A vulnerability where untrusted data is used to abuse the logic of an application, inflict a denial of service (DoS), or execute arbitrary code when deserialized

Using Components with Known Vulnerabilities   drill owasp_security

Front

Explain the OWASP category: Using Components with Known Vulnerabilities

Back

The use of components (libraries, frameworks, software modules) with known vulnerabilities, potentially undermining application defenses and enabling various attacks

Insufficient Logging & Monitoring   drill owasp_security

Front

What does Insufficient Logging & Monitoring refer to in OWASP?

Back

Lack of adequate logging, monitoring, and incident response, allowing attackers to further attack systems, maintain persistence, and tamper with or extract data without being detected

Author: Jason Walsh

j@wal.sh

Last Updated: 2024-10-30 16:43:54