"Buffer overflow attacks are said to have arisen because the C programming language supplied the framework and poor programming practices supplied the vulnerability."
To learn more about buffer overflows, review our glossary definition.
<< Back to quiz
2. Answer: d. SNMP
"Simple Network Management Protocol (SNMP) is the protocol governing network management and the monitoring of network devices and their functions. It is not necessarily limited to TCP/IP networks."
To learn how information security protocols effect application logging, read our Threat Monitor tip, or listen to this tip on your iPod or other MP3 player.
<< Back to quiz
To learn about benefits of application logging,read our Threat Monitor tip, or listen to this tip on your iPod or other MP3 player.
<< Back to quiz
To learn how distributed Denial-of-Service attacks operate, review our glossary definition.
<< Back to quiz
To receive tactics to improve the quality of Web applications, read this tip.
This was first published in July 2006
3. Answer: d. It's difficult to start.
"Configuring application severs and logging infrastructure to support detailed logging of application layer events can provide you with critical information in the event of a security incident. Proactive monitoring will provide you with the ability to detect events in near real-time, while reactive monitoring will offer invaluable assistance to forensic investigators. It's not difficult to get started – as we discussed, you probably already have the basic infrastructure in place."
4. Answer: c. Distributed Denial-of-Service attack
On the Internet, a distributed denial of service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users."
5. Answer: b. Clean and validate all user input.
Here are 11 rules that developers should follow during any Web application development cycle:
Security Management Strategies for the CIO