Page 15 - Security+ (635 notes by Nikkhah)
P. 15
217- Stack-based and heap-based overflows are two types of buffer overflows.
218- Programmers should use correct language and test web applications to prevent buffer
overflow attacks.
Signed applets
219- Web programmers should download only digitally signed applets.
220- The code-signing process ensures that code or an applet is authenticated by its vendor
and has not been modified.
221- Unsigned applets or code may create vulnerabilities in web applications.
Common Gateway Interface (CGI)
222- CGI is a web-side application that runs on the web server to provide interfaces to
applications.
223- Hackers can exploit poorly written CGI scripts to launch attacks.
224- CGI scripts should be scanned for vulnerabilities before being used on web servers.
Directory Services and FTP security
225- Lightweight Directory Access Protocol (LDAP) follows X.500 naming conventions.
226- LDAP transmissions can be secured using server certificates and SSL.
227- In normal FTP, the passwords and data are transmitted in clear text.
228- FTP file transfers should be secured using secure FTP (S/FTP) protocol.
Wireless communications
229- Wireless communications rely on radio frequencies.
230- They are susceptible to electromagnetic and radio frequency interference (EMI and RFI).
231- Spread spectrum wireless technologies are used to reduce the effects of EMI and RFI.
Frequency-hopping spread spectrum (FHSS)
232- RF signals are transmitted by rapidly switching frequencies.
233- FHSS works in the unlicensed frequency range of 2.4 GHz.
234- It has limited transmission speed of 1.6 to 10 Mbps.
235- It is used in Home RF and Bluetooth.
www.hrnikkhah.com by : Hamid Reza Nikkhah Page 13