Objective 1.6 - Security Concerns with Various Vulnerabilities

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Cloud-based vs. on-premises vulnerabilities

the latter refers to software vulnerabilities, weak configurations, and third-party issues arising from hosts, servers, routers, switches, access points, and firewalls located on a private network installed to private offices or campus buildings

2
New cards

Zero Day

Attack against a vulnerability that is unknown to the original developer or manufacturer

3
New cards

Weak configurations

Configuration settings that are not properly implemented, resulting in vulnerabilities

4
New cards

Open Permissions Vulnerability

A vulnerability that occurs when files are not secured with proper permissions and left open to the public

5
New cards

Unsecured root accounts

Unprotected accounts that give unfettered access to all resources.

6
New cards

Weak encryption

An encryption algorithm which can be broken within a time frame that would enable the breaker to take advantage of the information that has been encrypted.

7
New cards

Unsecure Protocols

Also called insecure protocols, using protocols for telecommunications that do not provide adequate protections.

8
New cards

Open ports and services

Devices and services that are often configured to allow the most access so that the user can then close those ports that are specific to that organization.

9
New cards

Third-party risks

Vulnerabilities that arise from dependencies in business relationships with suppliers and customers.

10
New cards

Vendor management

Policies and procedures to identify vulnerabilities and ensure security of the supply chain.

11
New cards

System integration

Connectivity between the systems of an organization and its third parties.

12
New cards

Lack of vendor support

When the company that made a device provides no support for the device.

13
New cards

Supply chain

the connected chain of all of the business entities, both internal and external to the company, that perform or support the logistics function

14
New cards

Outsourced code development

Contracting with third parties to assist the organization in the development and writing of a software program or app.

15
New cards

Data storage (third party risk)

when storing data, consider the type of data and if it requires encryption (encryption limits exposure but adds complexity)

16
New cards

Improper or weak patch management

Firmware:

Operating system:

Applications:

17
New cards

Legacy Platforms

The risk with legacy systems is that they might not have any vendor support because the vendor has deemed that the system has reached the end of its life and there will be no more patches. As technologies improve, so do the hacking tools, and the legacy systems may have limited or no protection against them.

18
New cards

Data loss

an error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing.

19
New cards

Data breaches

A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.

20
New cards

Data exfiltration

The process by which an attacker takes data that is stored inside of a private network and moves it to an external network.

21
New cards

Identity theft

the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.

22
New cards

Reputation Impact

impact on reputation due to a vulnerability being exploited; organizations are often required to disclose resulting in stock price drops, loss of clients

23
New cards

Availability Loss Impact

You can lose uptime and availability causing outages making a system unavailable, directly hurting your customers