6. Vulnerability Types Flashcards

1
Q

Vulnerability impact

Vulnerability impact

A

Vulnerabilities expose organizations to security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information security goals

Vulnerability impact

A

Confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

Vulnerability impact

A

Unauthorized changes, hacker alterations, service disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

Vulnerability impact

A

To prevent unauthorized changes to information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

Vulnerability impact

A

Authorized access, denial of service attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Financial risk

Vulnerability impact

A

Costs, incident response, data theft, identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Reputational risk

Vulnerability impact

A

Negative publicity, loss of goodwill, stakeholder decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Strategic risk

Vulnerability impact

A

Impact on goals and objectives, product development, competition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Operational risk

A

Business process slowdown, customer order delays, manual workarounds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compliance risk

Vulnerability impact

A

Legal and regulatory violations, HIPAA, sanctions, fines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Evaluating impacts

Vulnerability impact

A

Categorizing risks, financial, reputational, strategic, operational, compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Supply chain vulnerabilities

Supply chain vulnerabilities

A

IT organizations rely on external vendors for hardware, software, and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Impact on organizations

Supply chain vulnerabilities

A

Security issues in the supply chain can affect organizational operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

End-of-life announcements

Supply chain vulnerabilities

A

Security professionals must monitor vendor announcements about product lifecycle terminations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Importance of patch management

Supply chain vulnerabilities

A

Timely patch updates protect systems against new vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Running products without patches

Supply chain vulnerabilities

A

End-of-life announcements mean no more patches, making it difficult to maintain secure systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Different terms for product support termination

Supply chain vulnerabilities

A

Terminology varies among vendors; understanding definitions is crucial.

18
Q

Steps in product lifecycle termination

Supply chain vulnerabilities

A

Product end-of-sale and end-of-support announcements mark different stages.

19
Q

Risks of using legacy products

Supply chain vulnerabilities

A

Legacy products may introduce unpatchable vulnerabilities.

20
Q

Informal lack of vendor support

Supply chain vulnerabilities

A

Lack of vendor support can be as dangerous as running an unsupported product.

21
Q

Vulnerabilities in embedded systems

Supply chain vulnerabilities

A

Integrated vendor systems may have hidden vulnerabilities.

22
Q

Risks of relying on vendors for cloud services

Supply chain vulnerabilities

A

Vendors assume responsibility for managing risks in cloud services.

23
Q

Importance of vendor viability

Supply chain vulnerabilities

A

Ensuring vendors remain viable is crucial for sustained support and security.

24
Q

Mitigating risks in data storage

Supply chain vulnerabilities

A

Keeping independent backups reduces the risk of vendor inability to provide data access.

25
Q

Configuration vulnerabilities

Configuration vulnerabilities

A

Potential risks arising from system configuration errors that can compromise enterprise security.

26
Q

Default configurations

Configuration vulnerabilities

A

The pre-set settings on devices, such as copiers or building controllers, which may contain security flaws if not modified.

27
Q

Misconfigured systems

Configuration vulnerabilities

A

Systems with errors in their settings or weak security configurations that can lead to serious security issues.

28
Q

Least privilege principle

Configuration vulnerabilities

A

The concept that users should only have the minimum necessary permissions required for their job function.

29
Q

Encryption protocols

Configuration vulnerabilities

A

Protocols used to secure communications, which, if misconfigured, can result in eavesdropping and tampering risks.

30
Q

Cryptographic keys

Configuration vulnerabilities

A

Keys used in encryption systems that must be carefully managed to prevent unauthorized access and impersonation.

31
Q

Digital certificates

Configuration vulnerabilities

A

Certificates used to verify the authenticity and integrity of digital communications, requiring strong management processes to prevent misuse.

32
Q

Patch management

Configuration vulnerabilities

A

The practice of regularly applying security updates and patches to systems, applications, and firmware to address known vulnerabilities.

33
Q

Operating system patches

Configuration vulnerabilities

A

Updates specifically targeting the security of the operating system to mitigate potential risks.

34
Q

Unpatched devices

Configuration vulnerabilities

A

Devices that have not received the latest security updates, posing a potential entry point for attackers into the network.

35
Q

Account management

Configuration vulnerabilities

A

The process of properly configuring user accounts with appropriate permissions to prevent misuse or unauthorized access.

36
Q

Strong certificate management

Configuration vulnerabilities

A

Effective procedures and controls in place to safeguard the issuance and use of digital certificates and protect associated private keys.

37
Q

Documented security standards

Configuration vulnerabilities

A

Established guidelines and protocols that IT professionals should rely on when installing systems to ensure secure configurations.

38
Q

Architectural vulnerabilities

Architectural vulnerabilities

A

Flaws in a complex system due to improper design, leading to fundamental issues that are difficult to fix.

39
Q

Incorporating security requirements

Architectural vulnerabilities

A

The importance of integrating security needs early in the design process to avoid weaknesses in architecture and system designs.

40
Q

Business processes and people

Architectural vulnerabilities

A

Considering the impact of business processes and users on the security of a system, as untrained users and insecure processes can have a significant effect.

41
Q

System sprawl

Architectural vulnerabilities

A

The phenomenon of having numerous devices connected to a network without proper management throughout their lifecycle, leading to security issues and open vulnerabilities.

42
Q

Assessing architectural processes

Architectural vulnerabilities

A

The need for security professionals to evaluate all organizational architectural processes to ensure the inclusion of proper security controls.