Skip to content

Commit 298e62f

Browse files
authored
Merge pull request iluwatar#67 from austinsonger/master
Added Security Related Questions, REMAINDER: Fix minor typo.
2 parents ea17d9a + 00d5d41 commit 298e62f

File tree

1 file changed

+25
-3
lines changed

1 file changed

+25
-3
lines changed

Diff for: README.md

+25-3
Original file line numberDiff line numberDiff line change
@@ -5412,14 +5412,29 @@ You can test by using a stored procedure, so the application must be sanitize th
54125412

54135413
<details>
54145414
<summary>What is DNS Spoofing? How to prevent it?</summary><br><b>
5415+
5416+
DNS spoofing occurs when a particular DNS server’s records of “spoofed” or altered maliciously to redirect traffic to the attacker. This redirection of traffic allows the attacker to spread malware, steal data, etc.
5417+
5418+
**Prevention**
5419+
- Use encrypted data transfer protocols - Using end-to-end encryption vian SSL/TLS will help decrease the chance that a website / its visitors are compromised by DNS spoofing.
5420+
- Use DNSSEC - DNSSEC, or Domain Name System Security Extensions, uses digitally signed DNS records to help determine data authenticity.
5421+
- Implement DNS spoofing detection mechanisms - it’s important to implement DNS spoofing detection software. Products such as XArp help product against ARP cache poisoning by inspecting the data that comes through before transmitting it.
5422+
54155423
</b></details>
54165424

54175425
<details>
54185426
<summary>What can you tell me about Stuxnet?</summary><br><b>
5427+
5428+
Stuxnet is a computer worm that was originally aimed at Iran’s nuclear facilities and has since mutated and spread to other industrial and energy-producing facilities. The original Stuxnet malware attack targeted the programmable logic controllers (PLCs) used to automate machine processes. It generated a flurry of media attention after it was discovered in 2010 because it was the first known virus to be capable of crippling hardware and because it appeared to have been created by the U.S. National Security Agency, the CIA, and Israeli intelligence.
5429+
5430+
54195431
</b></details>
54205432

54215433
<details>
54225434
<summary>What can you tell me about Spectre?</summary><br><b>
5435+
5436+
Spectre is an attack method which allows a hacker to “read over the shoulder” of a program it does not have access to. Using code, the hacker forces the program to pull up its encryption key allowing full access to the program
5437+
54235438
</b></details>
54245439

54255440
<details>
@@ -5430,9 +5445,6 @@ You can test by using a stored procedure, so the application must be sanitize th
54305445
<summary>Explain "Format String Vulnerability"</summary><br><b>
54315446
</b></details>
54325447

5433-
<details>
5434-
<summary>Explain "Buffer Overflow"</summary><br><b>
5435-
</b></details>
54365448

54375449
<details>
54385450
<summary>Explain DMZ</summary><br><b>
@@ -5480,6 +5492,10 @@ HTTP Header Injection vulnerabilities occur when user input is insecurely includ
54805492

54815493
<details>
54825494
<summary>Explain what is Buffer Overflow</summary><br><b>
5495+
5496+
A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program attempting to write the data to the buffer overwrites adjacent memory locations.
5497+
5498+
54835499
</b></details>
54845500

54855501
##### Containers
@@ -5497,6 +5513,9 @@ HTTP Header Injection vulnerabilities occur when user input is insecurely includ
54975513

54985514
<details>
54995515
<summary>Explain MAC flooding attack</summary><br><b>
5516+
5517+
MAC address flooding attack (CAM table flooding attack) is a type of network attack where an attacker connected to a switch port floods the switch interface with very large number of Ethernet frames with different fake source MAC address.
5518+
55005519
</b></details>
55015520

55025521
<details>
@@ -5509,6 +5528,9 @@ HTTP Header Injection vulnerabilities occur when user input is insecurely includ
55095528

55105529
<details>
55115530
<summary>What is Cache Poisoned Denial of Service?</summary><br><b>
5531+
5532+
CPDoS or Cache Poisoned Denial of Service. It poisons the CDN cache. By manipulating certain header requests, the attacker forces the origin server to return a Bad Request error which is stored in the CDN’s cache. Thus, every request that comes after the attack will get an error page.
5533+
55125534
</b></details>
55135535

55145536
## Puppet

0 commit comments

Comments
 (0)