A2

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/10

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:35 AM on 10/31/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

11 Terms

1
New cards

Different Types of Computer and/or System

A diverse range of computer systems, each exposed to various cybersecurity threats and vulnerabilities.

2
New cards

Network Vulnerabilities

Weaknesses within an organization's network infrastructure, including issues like open firewall ports and vulnerabilities associated with external storage devices.

3
New cards

Organizational Vulnerabilities

Weaknesses originating from within the organization, including problems related to file permissions, privileges, and password policies.

4
New cards

Software Vulnerabilities

Weaknesses in software components, such as those arising from downloading software from untrustworthy sources or using illegal copies.

5
New cards

Operating System Vulnerabilities

Vulnerabilities related to the organization's operating systems, which may stem from running unsupported versions or failing to install essential updates.

6
New cards

Mobile Device Vulnerabilities

Vulnerabilities found in mobile devices that rely on Original Equipment Manufacturers (OEMs) for system software updates.

7
New cards

Physical Vulnerabilities

Weaknesses involving physical access, such as the theft of equipment, USB storage devices with sensitive data, or the collection of passwords and other information through social-engineering techniques.

8
New cards

Process of How People Use the System

Vulnerabilities that emerge from the ways individuals interact with the system, including leaks and the improper sharing of security details.

9
New cards

Security Implications of Cloud Computing and IoT Devices

Considerations for security in the context of cloud computing and Internet of Things (IoT) devices.

10
New cards

Up-to-Date Sources of Information on Specific Known Hardware and Software Vulnerabilities

Reliable resources that provide current information about identified vulnerabilities in hardware and software.

11
New cards

Attack Vectors

Various pathways through which systems can be targeted, including Wi-Fi, Bluetooth, internet connections, and internal network access.