167. Hardware Vulnerabilities

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Hardware Vulnerabilities

Security flaws or weaknesses inherent in a device’s physical components or design that can be exploited to compromise the integrity, confidentiality, or availability of the system and its data

2
New cards

Hardware Vulnerabilities sources

Device’s firmware

End-of-life hardware

Legacy Hardware

unsupported systems and apps

Unpatched systems

Hardware misconfigurations

3
New cards

Firmware

Specialized form of software stored on hardware device, like a router or smart thermostat, that provides low-level control for the device’s specific hardware

4
New cards

End-of-life Systems

Hardware or software products that have reached the end of their life cycle

5
New cards

Legacy Systems

Outdated computing software, hardware, or technologies that have been largely superseded by newer and more efficient alternatives

6
New cards

Unsupported Systems

Hardware or software products that no longer receive official technical support, security updates, or patches from their respective vendors or developers

7
New cards

Unpatched System

Device, app, or piece of software that has not been updated with the latest security patches so that it remains vulnerable to known exploits and attacks

8
New cards

Hardware Misconfiguration

Occurs when a device’s settings, parameters, or options are not optimally set up, and this can cause vulnerabilities to exist, a decrease in performance, or unintended behavior of devices or systems

9
New cards
Hardening
Involves tightening the security of a system
10
New cards
Patching
Involves the regular updating of the software, firmware, and applications with the latest security patches
11
New cards
Configuration Enforcement
Used to ensure that all devices and systems adhere to a standard secure configuration
12
New cards
Decommissioning
Means that the system is retired and removed from the network
13
New cards
Isolation
Used to limit the potential damage that might occur from a potential security breach
14
New cards
Segmentation
Used to divide the network into segments