The _____________________function is a handy way to output the value of an expression.
XML ___________________ are a relatively obscure feature, an…
XML ___________________ are a relatively obscure feature, and unfortunately, attackers have been creative in finding ways of abusing these.
The best way to mitigate risks is by threat modeling the dev…
The best way to mitigate risks is by threat modeling the development environment and processes. Analyze the attack surface for a range of threats, treating the source code as your primary asset. List three basic mitigations for typical development work.
_____________________ are a common vulnerability closely rel…
_____________________ are a common vulnerability closely related to injection attacks. Instead of escaping from quotation marks, this attack escapes into parent directories to gain unexpected access to other parts of the filesystem.
____________________ happens when the result of a computatio…
____________________ happens when the result of a computation exceeds the capacity of a fixed-width integer, leading to unexpected results, which can create a vulnerability.
A ________________________occurs when code accesses a memory…
A ________________________occurs when code accesses a memory location outside of the intended target buffer.
___________________________ are the most basic building bloc…
___________________________ are the most basic building blocks of many languages, including Java and C/C++, and if any computation exceeds their limited range, you get the wrong result silently.
List three guidelines to consider when choosing a Web framew…
List three guidelines to consider when choosing a Web framework.
The _________________ is a structured tree of objects that c…
The _________________ is a structured tree of objects that correspond to browser windows and their contents.
For the system as a whole to be secure, each of its componen…
For the system as a whole to be secure, each of its components must be secure. In addition, the interfaces between them must be secure. List one basic factor to consider when choosing secure components.