Skip to content

Commit 6ec14da

Browse files
Minor tweaks to quiz level text
Signed-off-by: David A. Wheeler <[email protected]>
1 parent bd1106d commit 6ec14da

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

secure_software_development_fundamentals.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1248,7 +1248,7 @@ You also need to ensure that your system is not vulnerable to a “dependency co
12481248
🔔 Dependency confusion is a special case of 2021 CWE Top 25 #34, *Uncontrolled Search Path Element* ([CWE-427](https://cwe.mitre.org/data/definitions/427.html)). Relying on plugins, libraries, or modules from untrusted sources, and relying on untrustworthy content delivery networks, is considered part of 2021 OWASP Top 10 #8 (A08:2021), *Software and Data Integrity Failures*.
12491249

12501250

1251-
## Quiz 3.2
1251+
#### Quiz 3.2: Downloading and Installing Reusable Software
12521252

12531253
\>\>What are good ways to acquire software? Select all answers that apply.<<
12541254

@@ -2285,7 +2285,7 @@ One of the simplest ways to ensure an attacker cannot trigger vulnerabilities fr
22852285

22862286
🔔 Integer overflow or wraparound is such a common cause of security vulnerabilities that it is 2021 CWE Top 25 #12 and 2019 CWE Top 25 #8. It is [CWE-190](https://cwe.mitre.org/data/definitions/190.html), *Integer overflow or wraparound*.
22872287

2288-
#### Quiz: Avoid Integer Overflow, Wraparound, and Underflow
2288+
#### Quiz 2.7: Avoid Integer Overflow, Wraparound, and Underflow
22892289

22902290
>>Integer overflows can be ignored when handling untrusted data. True or False?<<
22912291

@@ -3057,7 +3057,7 @@ An obvious but surprisingly common problem is loops where an attacker can cause
30573057

30583058
Make sure that you have backups of important datasets and a workable recovery process. That way, if an attacker manages to shut down the whole system, the data loss will be minimized. If necessary, you could even restart the service somewhere else or in some other form using the backups. You should have multiple backups, and at least some older ones should be in *cold storage* (that is, the backups cannot be modified by a later computer attack). That way, if newer backups are corrupted by an attacker (such as by using a ransomware attack), there are backups that can still be used.
30593059

3060-
#### Quiz 3.9
3060+
#### Quiz 3.9: Countering Denial-of-Service (DoS) Attacks
30613061

30623062
\>\>Select all the approaches that might help counter denial-of-service (DoS) attacks if your service is accessible on the public internet:<<
30633063

0 commit comments

Comments
 (0)