Describe a programming situation in which least privilege is a good strategy to improve security.
What will be an ideal response?
Any situation in which the principle of least privilege is not already in place. Students need to demonstrate that least privilege is always an objective for secure programming.
You might also like to view...
Assuming that bitset b1 contains the bits [0 1 1 0] and bitset b2 contains the bits [1 1 1 1], which of the following expressions returns true?
a. b1.any() b. b1 == b2 c. b1.test( 3 ) d. b2.none()
Since CGI scripts are designed to run by individuals around the world, they are the prime targets for malicious users to exploit any vulnerability.
Answer the following statement true (T) or false (F)
The command used to create an index is ____________________.
Fill in the blank(s) with the appropriate word(s).
A vulnerability scanner that uses its running service’s access level to better assess vulnerabilities across multiple assets within an organization is performing a:
A. Credentialed scan. B. Non-intrusive scan. C. Privilege escalation test. D. Passive scan