GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

The best way to mitigate risks is by threat modeling the dev…

The best way to mitigate risks is by threat modeling the development environment and processes. Analyze the attack surface for a range of threats, treating the source code as your primary asset. List three basic mitigations for typical development work.

Read Details

XML ___________________ are a relatively obscure feature, an…

XML ___________________ are a relatively obscure feature, and unfortunately, attackers have been creative in finding ways of abusing these.

Read Details

_____________________ are a common vulnerability closely rel…

_____________________ are a common vulnerability closely related to injection attacks. Instead of escaping from quotation marks, this attack escapes into parent directories to gain unexpected access to other parts of the filesystem.

Read Details

____________________ refers to the common technique of conve…

____________________ refers to the common technique of converting data objects to a byte stream, a little like a Star Trek transporter does, to then “beam” them through time and space.

Read Details

____________________ happens when the result of a computatio…

____________________ happens when the result of a computation exceeds the capacity of a fixed-width integer, leading to unexpected results, which can create a vulnerability.

Read Details

C programs use ______________ to allocation memory, and when…

C programs use ______________ to allocation memory, and when it’s no longer needed, they release each allocation for reuse by calling free(3).

Read Details

A ___________________________ detects underlying bug or bugs…

A ___________________________ detects underlying bug or bugs.

Read Details

What is a DREAD assessment? What do each of the letters stan…

What is a DREAD assessment? What do each of the letters stand for?

Read Details

___________________________ are the most basic building bloc…

___________________________ are the most basic building blocks of many languages, including Java and C/C++, and if any computation exceeds their limited range, you get the wrong result silently.

Read Details

A ______________________ is a side-channel attack that infer…

A ______________________ is a side-channel attack that infers information from the time it takes to do an operation, indirectly learning about some state of the system that should be private.

Read Details

Posts pagination

Newer posts 1 … 43,377 43,378 43,379 43,380 43,381 … 74,725 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top