1.6 Explain the security concerns associated with various types of vulnerabilities Flashcards

1
Q

Zero-Day

A

A never before seen vulnerability. No way to patch it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Open Permission

A

Unsecured data that is left open to the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unsecured Root Account

A

A admin account that is compromised. Due to weak passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Errors

A

Error message that have to much information. Error message list Service type, version info, debug data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Weak encryption

A

Protocols, hashes, and length of encryption key are out dated or already have a exposed vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unsecure Protocols

A

Protocols that aren’t encrypted. Data that is displayed in the clear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Default Settings

A

Uses the default username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Open ports and services

A

Server that has no Firewall or Network fire wall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Improper or weak patch management

A

Not patching the Firmware, OS, or applications. Causes data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Legacy Platforms

A

Old systems that cant be easily upgraded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

System Integration

A

Professional and maintenance team that have admin and physical access to your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lack of vendor support

A

Vendors that do not put/take a long time to patch vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Supply Chain Risk

A

Not in control of security from third party locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Outsourced code

A

Code that is developed by third party needs to secure. Code needs to checked for vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Storage

A

Storing data at at third party location needs to be encrypted. Also the way the date is being transferred needs to be secured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vulnerability Impacts

A

Finical, data loss, ID theft, data breaches, Reputation, Availability loss,