Tag: security
Questions Related to security
-
Looksky worm
-
Warhol worm
-
Klez
-
Sober
-
Samy worm
-
Bom Sabado
-
SQL Slammer
-
Sober worm
-
Group based access control should be implemented to assign permissions to application users
-
Consistent authorization checking should be performed on all application pages
-
A set of all allowable actions should be defined for each user role and all other's denied
-
All failed access authorization requests should be logged to a secure location for review by administrators
-
Request that the user authenticate him/herself by replying to the email with their account credentials.
-
Personalized greeting line
-
Providing easy access to the customer's account via a “Click Here” style link
-
Sending the email from a domain set up specifically for the special offer
-
Client (Browser)
-
Database
-
Web Application
-
Web Server
-
Secure
-
Domain
-
Expires
-
Static
-
Compromise of users
-
Loss of data integrity
-
Destruction of data
-
None of the above
-
Host Header
-
Cookie
-
Referrer Header
-
None of the above
-
Java
-
ASP.Net
-
Perl
-
All of the above
-
Data is validated against a list of values that are known to be valid
-
Data is validated against a list of values that are known to be invalid
-
Both of the above
-
None of the above