Key Web Application Risks: OWASP Security Flashcards
Table of Contents
- OWASP Security Flashcards
- What does OWASP stand for? drill owasp_security
- What is the OWASP Top 10? drill owasp_security
- Injection drill owasp_security
- Broken Authentication drill owasp_security
- Sensitive Data Exposure drill owasp_security
- XML External Entities (XXE) drill owasp_security
- Broken Access Control drill owasp_security
- Security Misconfiguration drill owasp_security
- Cross-Site Scripting (XSS) drill owasp_security
- Insecure Deserialization drill owasp_security
- Using Components with Known Vulnerabilities drill owasp_security
- Insufficient Logging & Monitoring drill owasp_security
OWASP Security Flashcards
What does OWASP stand for? drill owasp_security
Front
What does OWASP stand for?
Back
Open Web Application Security Project
What is the OWASP Top 10? drill owasp_security
Front
What is the OWASP Top 10?
Back
A regularly updated report outlining the most critical web application security risks
Injection drill owasp_security
Front
Describe the OWASP category: Injection
Back
Untrusted data is sent to an interpreter as part of a command or query, tricking it into executing unintended commands or accessing unauthorized data
Broken Authentication drill owasp_security
Front
What is Broken Authentication in the context of OWASP?
Back
Weaknesses in authentication and session management that allow attackers to compromise passwords, keys, or session tokens
Sensitive Data Exposure drill owasp_security
Front
Explain Sensitive Data Exposure as defined by OWASP
Back
Failure to properly protect sensitive information such as financial data, healthcare information, or personally identifiable information (PII)
XML External Entities (XXE) drill owasp_security
Front
What is the XML External Entities (XXE) vulnerability?
Back
An attack against an application that parses XML input, where external entities can be used to disclose internal files or perform server-side request forgery
Broken Access Control drill owasp_security
Front
Define Broken Access Control in OWASP terms
Back
Restrictions on what authenticated users are allowed to do are not properly enforced, leading to unauthorized information disclosure, modification, or destruction
Security Misconfiguration drill owasp_security
Front
What does Security Misconfiguration refer to in OWASP?
Back
Insecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, and verbose error messages containing sensitive information
Cross-Site Scripting (XSS) drill owasp_security
Front
Explain Cross-Site Scripting (XSS)
Back
A vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users, potentially stealing session cookies or redirecting users to malicious sites
Insecure Deserialization drill owasp_security
Front
What is Insecure Deserialization?
Back
A vulnerability where untrusted data is used to abuse the logic of an application, inflict a denial of service (DoS), or execute arbitrary code when deserialized
Using Components with Known Vulnerabilities drill owasp_security
Front
Explain the OWASP category: Using Components with Known Vulnerabilities
Back
The use of components (libraries, frameworks, software modules) with known vulnerabilities, potentially undermining application defenses and enabling various attacks
Insufficient Logging & Monitoring drill owasp_security
Front
What does Insufficient Logging & Monitoring refer to in OWASP?
Back
Lack of adequate logging, monitoring, and incident response, allowing attackers to further attack systems, maintain persistence, and tamper with or extract data without being detected