Módulo 07 - Vulnerability Management Flashcards
(83 cards)
Define: Vulnerability Management
A: The process of
1. identifying,
2. evaluating,
3. treating
4. reporting
vulnerabilities to prevent exploitation
Define: End-of-Life (EOL) Systems
A: Products or systems that are no longer supported by the manufacturer or vendor, receiving no updates or security patches, making them vulnerable to new threats.
Define: Legacy Systems
A: Outdated computer systems or applications that are still in use despite their limitations, often due to the high cost or risk associated with replacing them.
Define: Firmware Vulnerabilities
A: Security flaws within the foundational software that controls hardware, which can be exploited to gain unauthorized access or persist on a system undetected.
Define: Meltdown and Spectre
A: Critical vulnerabilities discovered in 2018 affecting nearly all CPUs, allowing malicious programs to steal data being processed on the computer.
Define: LoJax
A: A malware discovered in 2018 that infects the UEFI firmware, allowing attackers to maintain persistence even after hard drive replacements or OS reinstallations.
Define: Vulnerability Scanning
A: The use of specialized tools to automatically identify potential security weaknesses in an organization’s digital assets.
Define: Shellshock
A: A significant vulnerability in the Bash shell affecting Unix-based systems, including macOS, allowing attackers to execute arbitrary commands.
Define: Heartbleed
A: A serious vulnerability in the OpenSSL cryptographic library that allowed attackers to read protected memory on affected servers.
Q: Acronym: UEFI
A: Unified Extensible Firmware Interface.
Q: Acronym: SMB
A: Server Message Block.
Q: Acronym: MMS
A: Multimedia Messaging Service.
Q: Acronym: OpenSSL
A: Open Secure Sockets Layer.
True or False:
The Stagefright vulnerability affected iOS devices.
A: False:
Stagefright affected Android devices by allowing code execution via specially crafted MMS messages.
True or False:
Heartbleed was a vulnerability in the OpenSSL library that compromised secret keys.
A: True:
Heartbleed allowed attackers to read sensitive memory contents, exposing secret keys.
True or False:
Firmware updates are unnecessary as firmware cannot be exploited.
A: False:
Firmware can contain vulnerabilities; updating it is crucial for security.
True or False:
macOS is completely safe from vulnerabilities due to its Unix-based architecture.
A: False:
macOS can have vulnerabilities, such as those exploited by the Shellshock bug.
Define: WannaCry Ransomware
A: A 2017 global ransomware attack that exploited the EternalBlue vulnerability to encrypt data and demand ransom payments.
Define: Stagefright Vulnerability
A: A critical flaw in the Android media playback engine that allowed remote code execution via MMS messages.
Define: Watering Hole Attack
A: A strategy where attackers compromise a website likely to be visited by their targets to distribute malware.
Define: Conficker Worm
A: A worm exploiting the MS08-067 vulnerability in Windows, leading to one of the largest infections in history.
Define: EternalBlue
A: An exploit developed by the NSA and leaked by the Shadow Brokers group, targeting vulnerabilities in Microsoft’s SMB protocol, notably used in the WannaCry attack.
Acronym:
Bash
A: Bourne Again Shell.
Define: Vulnerability Scanning
A: The process of automatically identifying vulnerabilities systems, such as
1. open ports
2. insecure configurations
3. missing patches.