Protecting software systems

Cards (5)

  • Secure by design
    This is an approach that seeks to make software systems as free of vulnerabilities as possible through such measures as continuous testing and adherence to best programming practices.
  • Buffer overflow attacks

    Occurs when a program tries to store more data in a buffer (temporary data storage area) than it was intended to hold. This may occur accidentally through programming error
  • Scripting restrictions
    Same Origin Policy (SOP) is a security measure that prevents a website's scripts from accessing and interacting with scripts used on other sites. Running scripts from other sites would be dangerous because a malicious script from a compromised site could interact with a script from a legitimate site without restriction, potentially leading to malware infections or sensitive data being compromised.
  • Accepting parameter without validation
    Dynamically generated HTML web pages can introduce security risks if inputs are not validated on the way in. Malicious script can be embedded within input that is submitted to web pages and this could then appear to browsers as originating from a trusted source.
  • The role of cookies
    Cookies are data stored on a computer system. They allow websites to store a small amount of uniquely identifying data on your computer system while you are visiting.
    Uses
    • When added something to shopping cart and leave without checking out you will be sent an email telling you to come back
    • Gives you recommendations based on what you've viewed and bought