What is a system vulnerability?
A weak point in a system that has the potential for exploitation
List the different areas from which system vulnerabilities may arise.
What are network vulnerabilities?
Major sources of attacks on a business’s IT systems, including open firewall ports
What is a network port?
The endpoint of a network communication used for different applications
True or False: All network ports are naturally secure.
False
What is a common risk associated with external storage devices?
They can introduce malicious software into the organization
What can happen if an employee uses an infected USB stick at work?
It can infect the work computer and potentially spread throughout the network
What can organisational vulnerabilities stem from?
Processes and policies of the organisation, such as file permissions and password policies
What is the consequence of assigning total permissions and privileges to an employee?
Anyone with access to that employee’s login could cause significant damage
What does a password policy ensure?
That secure passwords are employed by a system’s users
Fill in the blank: Passwords must include _______.
uppercase letters, lowercase letters, numbers & symbols
What are software vulnerabilities?
Flaws in software that can be exploited, often from untrustworthy sources
What is SQL injection?
A software vulnerability where users can enter an SQL statement to access data
What are zero-day vulnerabilities?
Flaws in software that are unknown to the developers, opening the system to threats
What can cause operating system vulnerabilities?
Flaws in the code and poor maintenance by the organization
What was a key factor in the NHS ransomware attack of 2017?
Use of the unsupported Windows XP operating system
What risk do mobile devices pose in a business context?
They may contain vulnerabilities in their system software
What is a major issue with OEM updates for mobile devices?
Delays in distributing important security patches
What is a significant physical vulnerability to IT systems?
The theft of equipment such as laptops and mobile devices
What is social engineering in the context of IT vulnerabilities?
Techniques used to manipulate individuals into divulging confidential information
What are process vulnerabilities?
Weaknesses in how individuals use a system that can lead to data leaks
What does sharing security details refer to?
Individuals sharing security information with others who may not be trusted
What is a vulnerability associated with cloud computing?
Accounts can be hacked, leading to data modification, deletion, or theft
What is the Internet of Things (IoT)?
The interconnectivity of non-standard computing devices to gather and share data