2.3 Explain various types of vulnerabilities

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Memory Injection

A technique involving the injection of malware into the memory space of an existing process for executing malicious code.

2
New cards

Buffer Overflow

A vulnerability where data written to a buffer exceeds its capacity, potentially overwriting adjacent memory.

3
New cards

Race Conditions

Circumstances where two events occur concurrently, leading to unpredictable behavior in an application.

4
New cards

Time-of-Check to Time-of-Use (TOCTOU) Attack

A race condition where a system checks a condition and then uses the information, allowing another process to alter it in the interim.

5
New cards

Time-of-Use (TOU) Attack

A scenario similar to TOCTOU where unsynchronized processes interfere with each other’s execution.

6
New cards

Malicious Update

An update that looks legitimate but contains harmful code or vulnerabilities, often integrated during the software update process.

7
New cards

Operating System Vulnerabilities

Flaws or weaknesses present in an operating system that can be exploited by attackers to gain unauthorized access or perform malicious actions.

8
New cards

Web-Based Vulnerabilities

Flaws in web applications that can be exploited over the internet, often leading to unauthorized access or data breaches.

9
New cards

Structured Query Language Injection (SQLi)

A web-based attack where an attacker inserts or 'injects' malicious SQL queries via input fields in order to manipulate databases.

10
New cards

Cross-Site Scripting (XSS)

A vulnerability that allows attackers to inject malicious scripts into trusted websites, which are then executed in the victim's browser.

11
New cards

Hardware Vulnerabilities

Flaws in physical devices that can be exploited to gain unauthorized access or cause disruption.

12
New cards

Firmware Vulnerabilities

Security weaknesses found in the low-level software that controls hardware devices, which can lead to exploitation.

13
New cards

End-of-Life (EOL) Devices

Devices that the manufacturer no longer sells or supports, often leading to increased risk due to lack of security patches.

14
New cards

Legacy Devices

Older devices that may still be in use but run outdated software, resulting in potential security risks due to known vulnerabilities.

15
New cards

Virtualization Vulnerabilities

Security issues that arise within virtual environments, where multiple virtual machines operate on the same physical hardware.

16
New cards

Virtual Machine (VM) Escape

An attack that allows an attacker to escape the boundaries of a virtual machine, gaining access to the host system or other VMs.

17
New cards

Resource Reuse

A vulnerability associated with hypervisors where memory or other resources allocated to one VM might inadvertently be accessed by another VM.

18
New cards

Cloud-Specific Vulnerabilities

Security issues that arise specifically in cloud environments, often due to misconfigurations, lack of patches, or inadequate access controls.

19
New cards

Supply Chain Vulnerabilities

Security concerns related to the processes involved in acquiring raw materials to delivering the final product, with risks at each step of suppliers, manufacturers, and distributors.

20
New cards

Service Provider Vulnerabilities

Security issues arising when external third-party service providers have access to sensitive systems or data, which may lead to breaches if compromised.

21
New cards

Hardware Provider Vulnerabilities

Security risks associated with newly purchased hardware, including potential for malicious software to be embedded before delivery.

22
New cards

Software Provider Vulnerabilities

Risks linked to software updates or installations that may contain malicious code if the source is not trustworthy.

23
New cards

Cryptographic Vulnerabilities

Weaknesses in encryption algorithms or protocols that can be exploited to intercept or manipulate data.

24
New cards

Misconfiguration Vulnerabilities

Security risks that arise from incorrect setup of systems or applications, allowing unauthorized access or exploitation.

25
New cards

Mobile Device Vulnerabilities

Challenges in securing hand-held devices that may contain sensitive data and require specific security measures due to their portability and constant internet connectivity.

26
New cards

Sideloading

The process of installing applications on a mobile device from third-party sources, bypassing official app stores, which increases the risk of malware.

27
New cards

Jailbreaking

A method of removing software restrictions on iOS devices, allowing users to install unauthorized applications, effectively circumventing built-in security features.

28
New cards

Zero-Day Vulnerabilities

Security flaws that are exploited by attackers before the software vendor is aware of them or has developed a patch, leaving systems vulnerable until a fix is available.