Term
|
Definition
| A pair of programming calls in an application do not perform in the sequential manner that was intended. |
|
|
Term
| Race Condition Vulnerabilities |
|
Definition
Authentication Integrity Confidentiality |
|
|
Term
|
Definition
A race condition where: 1. Attacker si able to gain access prior to an authentication check 2. INserts code or alters authentication to disrupt normal authentication processes 3. Admin sees the intrusion and resets passwords, but the attacker remains logged in with old credentials. |
|
|
Term
|
Definition
| Time of Check to Time of Use. |
|
|
Term
| Support / Lifecycle Vulnerability |
|
Definition
| Maintaining systems past their useful life or maintaining multiple versions of hardware and software suchas End-of-Life, Embedded Systems, or systems that no long have Vendor Support. |
|
|
Term
| Secure Coding - Input Validation |
|
Definition
Techniques used to validate what is entered at the client or server side before processing Mitigation of attacks such as XSS SQL Injection Attacks |
|
|
Term
|
Definition
| Open Web Application Security Project |
|
|
Term
| Securing Coding - Two sites that support secure coding |
|
Definition
|
|
Term
| Misconfiguration / Weak Configuration |
|
Definition
| Weak or improper sconfigurations can expose an organization to risk with increased attack surface and holes in defenses |
|
|
Term
| Mitigation of Weak COnfigurations |
|
Definition
| Establish a standard configuration baseline, and periodically audit for that baseline. |
|
|
Term
|
Definition
An attack that is repeated on a machine until all resources are exhausted. Examples: - DoS - DDoS |
|
|