Deck 4: Trust and Threat Model

ملء الشاشة (f)
exit full mode
سؤال
3)In the Web trust model, the management of who to trust is essentially pushed down to the user level.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
12)The ____ trust model is a general trust model that applies in the areas of e-commerce, Web services, and peer-to-peer (P2P) systems.

A) distributed
B) reputation
C) strict hierarchy
D) web of trust
سؤال
17)A(n) ____ is a type of methodology commonly used to identify all the threats associated with a system.

A) attack pattern
B) qualitative assessment
C) quantitative assessment
D) attack tree
سؤال
5)All keys in PGP are stored in encrypted form.
سؤال
7)In a ____, the tree is structured as a shallow hierarchy where there is no subordinate CAs.

A) web of trust
B) Web hierarchy
C) distributed model
D) trusted issuer hierarchy
سؤال
11)PGP allows revocation on two levels: signature level and ____ level.

A) key
B) DN
C) certificate
D) user
سؤال
18)In an attack tree, each path tracing from the root node to a leaf node represents a unique way to achieve the goal of the attacker. This path is also called a(n) "____."

A) attack path
B) validation path
C) risk path
D) trust path
سؤال
14)____ risk is one that affects only individuals and not the entire organization.

A) Implicit
B) Marginal
C) Particular
D) Fundamental
سؤال
10)In PGP, ____ trust is established when a user trusts his or her own key pair.

A) marginal
B) complete
C) explicit
D) implicit
سؤال
19)Once a basic attack tree is completed, you can assign values to each leaf node. These values are often called ____.

A) weights
B) ranks
C) risk levels
D) indicators
سؤال
6)The ____ trust model is the most common trust model used by PKI.

A) strict hierarchy
B) distributed
C) Web
D) web of trust
سؤال
16)____ is a threat-rating system developed by Microsoft and is used to assess risk with great granularity.

A) Qualitative assessment
B) DREAD
C) Quantitative assessment
D) Risk-scaling
سؤال
9)In a ____ configuration, all peer trust anchors are potentially cross-certified among each other.

A) hub configuration
B) line configuration
C) mesh configuration
D) star configuration
سؤال
1)Trust by itself can be measured quantitatively.
سؤال
13)A(n) ____ risk is one that affects the entire organization or large numbers of persons or groups within the organization.

A) fundamental
B) particular
C) marginal
D) implicit
سؤال
20)____ speed up the overall development process by providing tested and proven development paradigms.

A) Attack patterns
B) Design patterns
C) Tree patterns
D) Attack trees
سؤال
4)The digital certificate used by PGP is equal to the standard X.509 certificate.
سؤال
15)____ assessment is a weighted risk measurement with input from various parties.

A) Qualitative
B) Quantitative
C) Marginal
D) ALE
سؤال
8)____ configurations connects each peer trust anchor to a hub.

A) Tree
B) Hub
C) Mesh
D) Line
سؤال
2)The strict hierarchy model is appropriate for every environment.
سؤال
34)Describe the strict hierarchy trust model.
سؤال
27)The term _________________________ is used to address the pair of forward and reverse certificates associated with a particular CA.
سؤال
40)What does DREAD stand for?
سؤال
36)Describe the Web trust model.
سؤال
31)______________________________ is a process of computing and assigning numeric values for each object being assessed.
سؤال
39)What are the steps involved in a quantitative assessment?
سؤال
37)What are the core assumptions for validation and trust in PGP?
سؤال
22)____ is a security vulnerability at the application level using a database.

A) Phishing
B) XSS
C) Cross-site scripting
D) SQL injection
سؤال
41)What are the possible damages caused by phishing?
سؤال
23)The goal of the ____ attacker is to inject a SQL query/command as an input, possibly via Web pages.

A) phishing
B) XSS
C) SQL injection
D) denial of service
سؤال
26)____ is a security vulnerability when malicious client-side script is injected into a Web application to gather sensitive user data.

A) Buffer overflow
B) Phishing
C) XSS
D) SQL injection
سؤال
38)What are some of the characteristics of a centralized system that implements a reputation trust model?
سؤال
30)_________________________ is an organizational process that identifies potential loss exposures and selects the most appropriate techniques for treating such exposures.
سؤال
35)What are the three variations of the distributed trust model?
سؤال
21)____ is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information by posing as a trustworthy person or business in an apparently official electronic communication.

A) Cross-site scripting
B) Denial of service
C) Phishing
D) SQL injection
سؤال
25)A ____ policy prevents a document or script loaded from one "origin" from accessing or modifying the properties of a document from a different "origin."

A) same-origin
B) trust domain
C) cross-certification
D) cross-domain
سؤال
29)____________________ is a security-analysis methodology that can be used to identify risks and to guide subsequent software development decisions.
سؤال
33)How is trust defined?
سؤال
24)The original definition of ____ is a software security vulnerability in Web applications that can be used by an attacker to compromise the same origin policy of client-side scripting languages.

A) denial of service
B) cross-site scripting
C) phishing
D) SQL injection
سؤال
28)______________________________ is the best implementation of the web of trust model.
سؤال
Match between columns
process of connecting the peer trust anchors in a distributed trust model
Web of trust model
process of connecting the peer trust anchors in a distributed trust model
Cross-certification
process of connecting the peer trust anchors in a distributed trust model
Attack patterns
process of connecting the peer trust anchors in a distributed trust model
Design patterns
process of connecting the peer trust anchors in a distributed trust model
Qualitative assessment
process of connecting the peer trust anchors in a distributed trust model
Risk
process of connecting the peer trust anchors in a distributed trust model
Attack tree
process of connecting the peer trust anchors in a distributed trust model
Trust model
process of connecting the peer trust anchors in a distributed trust model
Web trust model
provides a formal way of describing the security of systems based on various attacks
Web of trust model
provides a formal way of describing the security of systems based on various attacks
Cross-certification
provides a formal way of describing the security of systems based on various attacks
Attack patterns
provides a formal way of describing the security of systems based on various attacks
Design patterns
provides a formal way of describing the security of systems based on various attacks
Qualitative assessment
provides a formal way of describing the security of systems based on various attacks
Risk
provides a formal way of describing the security of systems based on various attacks
Attack tree
provides a formal way of describing the security of systems based on various attacks
Trust model
provides a formal way of describing the security of systems based on various attacks
Web trust model
decentralizes the task of trust management to the users
Web of trust model
decentralizes the task of trust management to the users
Cross-certification
decentralizes the task of trust management to the users
Attack patterns
decentralizes the task of trust management to the users
Design patterns
decentralizes the task of trust management to the users
Qualitative assessment
decentralizes the task of trust management to the users
Risk
decentralizes the task of trust management to the users
Attack tree
decentralizes the task of trust management to the users
Trust model
decentralizes the task of trust management to the users
Web trust model
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Web of trust model
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Cross-certification
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Attack patterns
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Design patterns
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Qualitative assessment
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Risk
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Attack tree
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Trust model
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Web trust model
standard solutions to common problems in software design
Web of trust model
standard solutions to common problems in software design
Cross-certification
standard solutions to common problems in software design
Attack patterns
standard solutions to common problems in software design
Design patterns
standard solutions to common problems in software design
Qualitative assessment
standard solutions to common problems in software design
Risk
standard solutions to common problems in software design
Attack tree
standard solutions to common problems in software design
Trust model
standard solutions to common problems in software design
Web trust model
the most popular PKI trust model used today
Web of trust model
the most popular PKI trust model used today
Cross-certification
the most popular PKI trust model used today
Attack patterns
the most popular PKI trust model used today
Design patterns
the most popular PKI trust model used today
Qualitative assessment
the most popular PKI trust model used today
Risk
the most popular PKI trust model used today
Attack tree
the most popular PKI trust model used today
Trust model
the most popular PKI trust model used today
Web trust model
sometimes referred as organizational survey assessment
Web of trust model
sometimes referred as organizational survey assessment
Cross-certification
sometimes referred as organizational survey assessment
Attack patterns
sometimes referred as organizational survey assessment
Design patterns
sometimes referred as organizational survey assessment
Qualitative assessment
sometimes referred as organizational survey assessment
Risk
sometimes referred as organizational survey assessment
Attack tree
sometimes referred as organizational survey assessment
Trust model
sometimes referred as organizational survey assessment
Web trust model
uncertainty concerning the occurrence of a loss
Web of trust model
uncertainty concerning the occurrence of a loss
Cross-certification
uncertainty concerning the occurrence of a loss
Attack patterns
uncertainty concerning the occurrence of a loss
Design patterns
uncertainty concerning the occurrence of a loss
Qualitative assessment
uncertainty concerning the occurrence of a loss
Risk
uncertainty concerning the occurrence of a loss
Attack tree
uncertainty concerning the occurrence of a loss
Trust model
uncertainty concerning the occurrence of a loss
Web trust model
speed up security analysis by providing tested and proven problem/solution pairs
Web of trust model
speed up security analysis by providing tested and proven problem/solution pairs
Cross-certification
speed up security analysis by providing tested and proven problem/solution pairs
Attack patterns
speed up security analysis by providing tested and proven problem/solution pairs
Design patterns
speed up security analysis by providing tested and proven problem/solution pairs
Qualitative assessment
speed up security analysis by providing tested and proven problem/solution pairs
Risk
speed up security analysis by providing tested and proven problem/solution pairs
Attack tree
speed up security analysis by providing tested and proven problem/solution pairs
Trust model
speed up security analysis by providing tested and proven problem/solution pairs
Web trust model
سؤال
42)What are the possible damages caused by a cross-site scripting attack?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Trust and Threat Model
1
3)In the Web trust model, the management of who to trust is essentially pushed down to the user level.
True
2
12)The ____ trust model is a general trust model that applies in the areas of e-commerce, Web services, and peer-to-peer (P2P) systems.

A) distributed
B) reputation
C) strict hierarchy
D) web of trust
B
3
17)A(n) ____ is a type of methodology commonly used to identify all the threats associated with a system.

A) attack pattern
B) qualitative assessment
C) quantitative assessment
D) attack tree
D
4
5)All keys in PGP are stored in encrypted form.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
7)In a ____, the tree is structured as a shallow hierarchy where there is no subordinate CAs.

A) web of trust
B) Web hierarchy
C) distributed model
D) trusted issuer hierarchy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
11)PGP allows revocation on two levels: signature level and ____ level.

A) key
B) DN
C) certificate
D) user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
18)In an attack tree, each path tracing from the root node to a leaf node represents a unique way to achieve the goal of the attacker. This path is also called a(n) "____."

A) attack path
B) validation path
C) risk path
D) trust path
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
14)____ risk is one that affects only individuals and not the entire organization.

A) Implicit
B) Marginal
C) Particular
D) Fundamental
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
10)In PGP, ____ trust is established when a user trusts his or her own key pair.

A) marginal
B) complete
C) explicit
D) implicit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
19)Once a basic attack tree is completed, you can assign values to each leaf node. These values are often called ____.

A) weights
B) ranks
C) risk levels
D) indicators
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
6)The ____ trust model is the most common trust model used by PKI.

A) strict hierarchy
B) distributed
C) Web
D) web of trust
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
16)____ is a threat-rating system developed by Microsoft and is used to assess risk with great granularity.

A) Qualitative assessment
B) DREAD
C) Quantitative assessment
D) Risk-scaling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
9)In a ____ configuration, all peer trust anchors are potentially cross-certified among each other.

A) hub configuration
B) line configuration
C) mesh configuration
D) star configuration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
1)Trust by itself can be measured quantitatively.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
13)A(n) ____ risk is one that affects the entire organization or large numbers of persons or groups within the organization.

A) fundamental
B) particular
C) marginal
D) implicit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
20)____ speed up the overall development process by providing tested and proven development paradigms.

A) Attack patterns
B) Design patterns
C) Tree patterns
D) Attack trees
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
4)The digital certificate used by PGP is equal to the standard X.509 certificate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
15)____ assessment is a weighted risk measurement with input from various parties.

A) Qualitative
B) Quantitative
C) Marginal
D) ALE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
8)____ configurations connects each peer trust anchor to a hub.

A) Tree
B) Hub
C) Mesh
D) Line
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
2)The strict hierarchy model is appropriate for every environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
34)Describe the strict hierarchy trust model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
27)The term _________________________ is used to address the pair of forward and reverse certificates associated with a particular CA.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
40)What does DREAD stand for?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
36)Describe the Web trust model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
31)______________________________ is a process of computing and assigning numeric values for each object being assessed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
39)What are the steps involved in a quantitative assessment?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
37)What are the core assumptions for validation and trust in PGP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
22)____ is a security vulnerability at the application level using a database.

A) Phishing
B) XSS
C) Cross-site scripting
D) SQL injection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
41)What are the possible damages caused by phishing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
23)The goal of the ____ attacker is to inject a SQL query/command as an input, possibly via Web pages.

A) phishing
B) XSS
C) SQL injection
D) denial of service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
26)____ is a security vulnerability when malicious client-side script is injected into a Web application to gather sensitive user data.

A) Buffer overflow
B) Phishing
C) XSS
D) SQL injection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
38)What are some of the characteristics of a centralized system that implements a reputation trust model?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
30)_________________________ is an organizational process that identifies potential loss exposures and selects the most appropriate techniques for treating such exposures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
35)What are the three variations of the distributed trust model?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
21)____ is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information by posing as a trustworthy person or business in an apparently official electronic communication.

A) Cross-site scripting
B) Denial of service
C) Phishing
D) SQL injection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
25)A ____ policy prevents a document or script loaded from one "origin" from accessing or modifying the properties of a document from a different "origin."

A) same-origin
B) trust domain
C) cross-certification
D) cross-domain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
29)____________________ is a security-analysis methodology that can be used to identify risks and to guide subsequent software development decisions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
33)How is trust defined?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
24)The original definition of ____ is a software security vulnerability in Web applications that can be used by an attacker to compromise the same origin policy of client-side scripting languages.

A) denial of service
B) cross-site scripting
C) phishing
D) SQL injection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
28)______________________________ is the best implementation of the web of trust model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
process of connecting the peer trust anchors in a distributed trust model
Web of trust model
process of connecting the peer trust anchors in a distributed trust model
Cross-certification
process of connecting the peer trust anchors in a distributed trust model
Attack patterns
process of connecting the peer trust anchors in a distributed trust model
Design patterns
process of connecting the peer trust anchors in a distributed trust model
Qualitative assessment
process of connecting the peer trust anchors in a distributed trust model
Risk
process of connecting the peer trust anchors in a distributed trust model
Attack tree
process of connecting the peer trust anchors in a distributed trust model
Trust model
process of connecting the peer trust anchors in a distributed trust model
Web trust model
provides a formal way of describing the security of systems based on various attacks
Web of trust model
provides a formal way of describing the security of systems based on various attacks
Cross-certification
provides a formal way of describing the security of systems based on various attacks
Attack patterns
provides a formal way of describing the security of systems based on various attacks
Design patterns
provides a formal way of describing the security of systems based on various attacks
Qualitative assessment
provides a formal way of describing the security of systems based on various attacks
Risk
provides a formal way of describing the security of systems based on various attacks
Attack tree
provides a formal way of describing the security of systems based on various attacks
Trust model
provides a formal way of describing the security of systems based on various attacks
Web trust model
decentralizes the task of trust management to the users
Web of trust model
decentralizes the task of trust management to the users
Cross-certification
decentralizes the task of trust management to the users
Attack patterns
decentralizes the task of trust management to the users
Design patterns
decentralizes the task of trust management to the users
Qualitative assessment
decentralizes the task of trust management to the users
Risk
decentralizes the task of trust management to the users
Attack tree
decentralizes the task of trust management to the users
Trust model
decentralizes the task of trust management to the users
Web trust model
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Web of trust model
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Cross-certification
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Attack patterns
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Design patterns
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Qualitative assessment
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Risk
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Attack tree
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Trust model
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
Web trust model
standard solutions to common problems in software design
Web of trust model
standard solutions to common problems in software design
Cross-certification
standard solutions to common problems in software design
Attack patterns
standard solutions to common problems in software design
Design patterns
standard solutions to common problems in software design
Qualitative assessment
standard solutions to common problems in software design
Risk
standard solutions to common problems in software design
Attack tree
standard solutions to common problems in software design
Trust model
standard solutions to common problems in software design
Web trust model
the most popular PKI trust model used today
Web of trust model
the most popular PKI trust model used today
Cross-certification
the most popular PKI trust model used today
Attack patterns
the most popular PKI trust model used today
Design patterns
the most popular PKI trust model used today
Qualitative assessment
the most popular PKI trust model used today
Risk
the most popular PKI trust model used today
Attack tree
the most popular PKI trust model used today
Trust model
the most popular PKI trust model used today
Web trust model
sometimes referred as organizational survey assessment
Web of trust model
sometimes referred as organizational survey assessment
Cross-certification
sometimes referred as organizational survey assessment
Attack patterns
sometimes referred as organizational survey assessment
Design patterns
sometimes referred as organizational survey assessment
Qualitative assessment
sometimes referred as organizational survey assessment
Risk
sometimes referred as organizational survey assessment
Attack tree
sometimes referred as organizational survey assessment
Trust model
sometimes referred as organizational survey assessment
Web trust model
uncertainty concerning the occurrence of a loss
Web of trust model
uncertainty concerning the occurrence of a loss
Cross-certification
uncertainty concerning the occurrence of a loss
Attack patterns
uncertainty concerning the occurrence of a loss
Design patterns
uncertainty concerning the occurrence of a loss
Qualitative assessment
uncertainty concerning the occurrence of a loss
Risk
uncertainty concerning the occurrence of a loss
Attack tree
uncertainty concerning the occurrence of a loss
Trust model
uncertainty concerning the occurrence of a loss
Web trust model
speed up security analysis by providing tested and proven problem/solution pairs
Web of trust model
speed up security analysis by providing tested and proven problem/solution pairs
Cross-certification
speed up security analysis by providing tested and proven problem/solution pairs
Attack patterns
speed up security analysis by providing tested and proven problem/solution pairs
Design patterns
speed up security analysis by providing tested and proven problem/solution pairs
Qualitative assessment
speed up security analysis by providing tested and proven problem/solution pairs
Risk
speed up security analysis by providing tested and proven problem/solution pairs
Attack tree
speed up security analysis by providing tested and proven problem/solution pairs
Trust model
speed up security analysis by providing tested and proven problem/solution pairs
Web trust model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
42)What are the possible damages caused by a cross-site scripting attack?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.