1.6 Flashcards

Explain the security concerns associated with various types of vulnerabilities.

1
Q

Weaknesses or security flaws present in cloud computing environments, services, or applications. _____________ may arise due to misconfigurations, insecure APIs, inadequate access controls, or vulnerabilities in underlying infrastructure, potentially exposing sensitive data or resources to unauthorized access or exploitation.

A

Cloud-based vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pertain to weaknesses or security flaws in locally hosted systems, networks, or applications within an organization’s physical premises.

A

On-premises
vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is a cyber-attack that exploits a previously unknown vulnerability or software flaw for which no patch or fix is available from the software vendor.

A

Zero-day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refers to the network of entities, vendors, suppliers, and partners involved in the development, manufacturing, distribution, and delivery of products and services within an organization’s ecosystem. Risks arise when vulnerabilities in this chain are exploited by attackers.

A

Supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Are outdated technology systems, applications, or software that are still in use within an organization.

A

Legacy platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The unintentional loss of data, resulting in its permanent or temporary unavailability or inability to be accessed.

A

Data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ______________ occurs when unauthorized individuals gain access to sensitive information without authorization. ____________ may involve the theft, exposure, or unauthorized disclosure of personal, financial, or proprietary data, potentially leading to identity theft, financial fraud, reputational damage, and regulatory penalties for organizations.

A

Data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_________________ refers to the unauthorized extraction of sensitive data from an organization’s systems to an external location controlled by attackers.

A

Data exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a type of cybercrime in which attackers steal and misuse individuals’ personal information for fraudulent purposes.

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Refers to the disruption of access to data, systems, or services, rendering them unavailable to authorized users. This leads to downtime, productivity losses, and negative impacts on business operations.

A

Availability loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly