1. Explain Transport Layer Security (TLS).
- TLS is a cryptographic protocol ensuring secure communication over a computer network.
- It provides confidentiality, integrity, and authentication between applications.
- TLS uses asymmetric cryptography for key exchange and symmetric encryption for data transfer.
- It is widely used in web browsers, email, messaging, and VoIP.
2. What role does encryption play in web application security?
- Encryption secures data transmission between client and server.
- It protects sensitive information such as passwords and personal data.
- Encryption helps in meeting compliance requirements like GDPR and HIPAA.
- It reduces the risk of data breaches and eavesdropping.
3. Explain OWASP CLASP.
- OWASP CLASP stands for Comprehensive, Lightweight Application Security Process.
- It is a set of best practices for integrating security into software development.
- CLASP focuses on security activities during each phase of software development.
- It helps developers understand and mitigate security risks.
4. How does SAMM differ from other software security models?
- SAMM (Software Assurance Maturity Model) is a framework for improving software security.
- It is risk-driven and allows organizations to tailor their security practices.
- SAMM focuses on measurable and iterative improvements.
- Unlike others, it provides a roadmap for maturity across business functions.
5. Why is audit logging important in API security?
- Audit logs track API activity, helping in detecting suspicious behavior.
- They provide evidence for forensic investigations after security incidents.
- Audit logs support compliance and regulatory requirements.
- They help in monitoring user access and usage patterns.
6. How does a service mesh contribute to securing microservice APIs?
- Service mesh manages service-to-service communication securely.
- It provides features like mutual TLS, access control, and traffic encryption.
- It helps enforce policies uniformly across microservices.
- A service mesh can monitor and log traffic for security audits.
7. What is the Vulnerability Assessment Lifecycle?
- It involves identifying, classifying, and prioritizing vulnerabilities.
- Steps include planning, scanning, analysis, remediation, and re-scanning.
- It ensures continuous security posture improvement.
- Helps organizations reduce the attack surface proactively.
8. What is the primary purpose of network-based vulnerability scanners?
- They detect vulnerabilities across networked systems and devices.
- Scanners help identify outdated software and misconfigurations.
- They support proactive patch management and risk mitigation.
- Used in compliance assessments and security audits.
9. What is Social Engineering in the context of hacking?
- It involves manipulating people to disclose confidential information.
- Common techniques include phishing, pretexting, and baiting.
- Social engineering exploits human psychology rather than technical flaws.
- It's a prevalent method used in cyberattacks and data breaches.
10. What role does Burp Suite play in the field of cybersecurity?
- Burp Suite is a tool for testing web application security.
- It offers features like proxy, scanner, repeater, and intruder.
- Used for finding vulnerabilities like SQL injection and XSS.
- Widely used by penetration testers and security professionals.