1.6 Explain the security concerns associated with various types of vulnerabilities. Flashcards

1
Q

What are Cloudbased vs. onpremises vulnerabilities?

A

Cloudbased vs. onpremises vulnerabilities refer to security weaknesses or risks associated with cloud-based environments compared to traditional on-premises systems, including issues related to data protection, access controls, network security, and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What term describes security weaknesses associated with cloud-based environments compared to on-premises systems?

A

Cloudbased vs. onpremises vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Zeroday vulnerability?

A

A Zeroday vulnerability is a security flaw or weakness in software or hardware that is exploited by attackers before the developer or vendor releases a patch or fix, leaving users vulnerable to exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What term describes a security flaw exploited by attackers before a patch is available?

A

Zeroday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Weak configurations?

A

Weak configurations are security vulnerabilities caused by inadequate or improper settings, permissions, or configurations in software, systems, or networks, which can be exploited by attackers to gain unauthorized access or compromise security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What term describes vulnerabilities caused by inadequate settings or configurations?

A

Weak configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Open permissions?

A

Open permissions are security risks resulting from excessive or unnecessary access rights granted to users, applications, or services, potentially exposing sensitive data or resources to unauthorized access, modification, or misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term describes excessive access rights granted to users, applications, or services?

A

Open permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Unsecure root accounts?

A

Unsecure root accounts are security vulnerabilities resulting from weak, default, or unsecured administrator accounts with unrestricted access privileges, which can be exploited by attackers to gain complete control over a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What term describes weak or default administrator accounts with unrestricted access?

A

Unsecure root accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Errors?

A

Errors are security concerns arising from programming mistakes, software bugs, or human errors that introduce vulnerabilities, weaknesses, or unexpected behaviors in applications, systems, or networks, potentially leading to exploitation or system failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What term describes programming mistakes or software bugs leading to vulnerabilities?

A

Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Weak encryption?

A

Weak encryption refers to cryptographic algorithms or keys that provide insufficient protection for sensitive data, making it susceptible to unauthorized access, interception, or decryption by attackers with sufficient computing power or resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What term describes cryptographic algorithms or keys providing insufficient protection?

A

Weak encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Unsecure protocols?

A

Unsecure protocols are communication standards or protocols that lack adequate security measures or encryption, making data transmitted over networks vulnerable to interception, eavesdropping, or manipulation by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What term describes communication standards lacking adequate security measures?

A

Unsecure protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are Default settings?

A

Default settings are preconfigured options or configurations in software, devices, or systems that are often insecure or generic, leaving them vulnerable to exploitation if not properly customized or secured by users or administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What term describes preconfigured options that are often insecure?

A

Default settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are Open ports and services?

A

Open ports and services are network endpoints or applications that are accessible from the internet or other networks, potentially exposing them to unauthorized access, exploitation, or attacks if not properly secured, monitored, or restricted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What term describes network endpoints accessible from the internet?

A

Open ports and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are Thirdparty risks?

A

Thirdparty risks are security concerns or vulnerabilities introduced by external vendors, suppliers, or service providers, whose products or services may have access to sensitive data, systems, or networks, posing risks to the security and integrity of organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What term describes security concerns introduced by external vendors or service providers?

A

Thirdparty risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Vendor management?

A

Vendor management is the process of overseeing, evaluating, and controlling relationships with external vendors, suppliers, or service providers to ensure their products or services meet security, quality, and compliance requirements and standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What term describes overseeing relationships with external vendors to ensure security and compliance?

A

Vendor management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is System integration?

A

System integration is the process of combining different subsystems or components into a unified system, application, or network to ensure seamless communication, interoperability, and functionality.

26
Q

What term describes combining different subsystems into a unified system?

A

System integration

27
Q

What is Lack of vendor support?

A

Lack of vendor support refers to the absence or discontinuation of software updates, patches, or security fixes provided by vendors for their products or services, leaving users vulnerable to newly discovered vulnerabilities or threats without adequate support or protection.

28
Q

What term describes the absence of software updates or patches from vendors?

A

Lack of vendor support

29
Q

What is Supply chain?

A

Supply chain refers to the network of vendors, suppliers, manufacturers, distributors, and partners involved in the production, distribution, and delivery of goods or services, encompassing the flow of materials, information, and resources across interconnected entities, often introducing security risks or vulnerabilities if not properly secured or monitored for potential threats or attacks.

30
Q

What term describes the network of vendors and suppliers involved in the production and delivery of goods or services?

A

Supply chain

31
Q

What is Outsourced code development?

A

Outsourced code development is the practice of hiring external contractors, third-party vendors, or offshore companies to develop software, applications, or components on behalf of an organization, potentially introducing security risks or vulnerabilities if not properly managed or supervised.

32
Q

What term describes hiring external contractors to develop software on behalf of an organization?

A

Outsourced code development

33
Q

What is Data storage?

A

Data storage is the process of storing, organizing, and managing digital data, files, or information in physical or virtual storage systems, devices, or platforms, which may be vulnerable to unauthorized access, data breaches, or other security threats if not properly secured or encrypted.

34
Q

What term describes storing and managing digital data in storage systems or platforms?

A

Data storage

35
Q

What are Improper or weak patch management practices?

A

Improper or weak patch management practices refer to inadequate or ineffective processes for applying, testing, or monitoring software patches, updates, or fixes, leaving systems vulnerable to known vulnerabilities or exploits that could otherwise be mitigated through timely and thorough patching.

36
Q

What term describes inadequate processes for applying software patches?

A

Improper or weak patch management

37
Q

What is Firmware?

A

Firmware is a type of software that provides low-level control for hardware devices, embedded systems, or peripherals, often containing vulnerabilities that, if exploited, could compromise the security, functionality, or stability of the device or system.

38
Q

What term describes low-level software providing control for hardware devices?

A

Firmware

39
Q

What is an Operating system (OS)?

A

An Operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs, acting as an intermediary between users and hardware, facilitating communication and interaction with the computer.

40
Q

What term describes software managing computer hardware and resources?

A

Operating system (OS)

41
Q

What are Applications?

A

Applications are software programs or tools designed to perform specific tasks, functions, or operations to meet user needs or requirements, running on various platforms or devices, which may contain vulnerabilities that could be exploited by attackers to compromise data or systems.

42
Q

What term describes software programs designed for specific tasks or functions?

A

Applications

43
Q

What are Legacy platforms?

A

Legacy platforms are outdated or older systems, technologies, or software applications that are no longer actively supported, maintained, or updated by vendors, often containing unpatched vulnerabilities or security weaknesses that pose risks to organizations still using them.

44
Q

What term describes outdated systems or software no longer supported by vendors?

A

Legacy platforms

45
Q

What are Impacts of security vulnerabilities?

A

Impacts of security vulnerabilities refer to the adverse effects or consequences resulting from the exploitation or exposure of vulnerabilities in systems, networks, or applications, which may include data loss, breaches, financial losses, reputation damage, or disruptions to operations.

46
Q

What term describes adverse effects resulting from the exploitation of vulnerabilities?

A

Impacts of security vulnerabilities

47
Q

What is Data loss?

A

Data loss is the unintended or accidental destruction, corruption, or removal of data, files, or information stored on digital devices, storage systems, or networks, resulting in the permanent or temporary loss of access to valuable or sensitive information.

48
Q

What term describes unintended destruction or removal of stored data?

A

Data loss

49
Q

What are Data breaches?

A

Data breaches are incidents where unauthorized parties gain access to sensitive or confidential data, files, or information stored on digital systems, networks, or databases, potentially leading to exposure, theft, or misuse of the data by malicious actors.

50
Q

What term describes incidents where unauthorized parties access sensitive data?

A

Data breaches

51
Q

What is Data exfiltration?

A

Data exfiltration is the unauthorized or malicious extraction, copying, or transmission of data from a system, network, or organization to an external location or attacker-controlled server, often carried out to steal or compromise sensitive information for malicious purposes.

52
Q

What term describes unauthorized extraction or transmission of data from a system?

A

Data exfiltration

53
Q

What is Identity theft?

A

Identity theft is a form of fraud or cybercrime where an attacker steals or impersonates the identity of an individual or organization to gain unauthorized access to resources, commit financial fraud, or engage in criminal activities using the victim’s identity and personal information.

54
Q

What term describes the fraudulent use of someone else’s identity?

A

Identity theft

55
Q

What are Financial impacts of security vulnerabilities?

A

Financial impacts of security vulnerabilities refer to the monetary losses, costs, or damages incurred by organizations as a result of security incidents, data breaches, or cyberattacks, including expenses related to recovery, remediation, fines, lawsuits, or business disruptions.

56
Q

What term describes monetary losses resulting from security incidents or breaches?

A

Financial impacts of security vulnerabilities

57
Q

What is Reputation damage?

A

Reputation damage is the negative impact on an individual’s, organization’s, or brand’s image, credibility, or public perception resulting from security incidents, data breaches, or unethical behavior, which may lead to loss of trust, customers, partnerships, or business opportunities.

58
Q

What term describes negative impact on an individual’s or organization’s image?

A

Reputation damage

59
Q

What is Availability loss?

A

Availability loss refers to the disruption, degradation, or unavailability of critical systems, services, or resources due to security incidents, cyberattacks, or technical failures, leading to downtime, reduced productivity, or loss of access to essential functions or data.

60
Q

What term describes the disruption or unavailability of critical systems or services?

A

Availability loss