1.Learning Aim A2 System Vulnerabilities Flashcards

(25 cards)

1
Q

What is a system vulnerability?

A

A weak point in a system that has the potential for exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the different areas from which system vulnerabilities may arise.

A
  • Network vulnerabilities
  • Organisational vulnerabilities
  • Software vulnerabilities
  • Operating system vulnerabilities
  • Mobile device vulnerabilities
  • Physical vulnerabilities
  • Process vulnerabilities
  • Cloud/IoT vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are network vulnerabilities?

A

Major sources of attacks on a business’s IT systems, including open firewall ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a network port?

A

The endpoint of a network communication used for different applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: All network ports are naturally secure.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a common risk associated with external storage devices?

A

They can introduce malicious software into the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can happen if an employee uses an infected USB stick at work?

A

It can infect the work computer and potentially spread throughout the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can organisational vulnerabilities stem from?

A

Processes and policies of the organisation, such as file permissions and password policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the consequence of assigning total permissions and privileges to an employee?

A

Anyone with access to that employee’s login could cause significant damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a password policy ensure?

A

That secure passwords are employed by a system’s users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: Passwords must include _______.

A

uppercase letters, lowercase letters, numbers & symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are software vulnerabilities?

A

Flaws in software that can be exploited, often from untrustworthy sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SQL injection?

A

A software vulnerability where users can enter an SQL statement to access data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are zero-day vulnerabilities?

A

Flaws in software that are unknown to the developers, opening the system to threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can cause operating system vulnerabilities?

A

Flaws in the code and poor maintenance by the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What was a key factor in the NHS ransomware attack of 2017?

A

Use of the unsupported Windows XP operating system

17
Q

What risk do mobile devices pose in a business context?

A

They may contain vulnerabilities in their system software

18
Q

What is a major issue with OEM updates for mobile devices?

A

Delays in distributing important security patches

19
Q

What is a significant physical vulnerability to IT systems?

A

The theft of equipment such as laptops and mobile devices

20
Q

What is social engineering in the context of IT vulnerabilities?

A

Techniques used to manipulate individuals into divulging confidential information

21
Q

What are process vulnerabilities?

A

Weaknesses in how individuals use a system that can lead to data leaks

22
Q

What does sharing security details refer to?

A

Individuals sharing security information with others who may not be trusted

23
Q

What is a vulnerability associated with cloud computing?

A

Accounts can be hacked, leading to data modification, deletion, or theft

24
Q

What is the Internet of Things (IoT)?

A

The interconnectivity of non-standard computing devices to gather and share data

25
What issue do IoT devices have regarding security?
They are often developed without security considerations