Operating System Vulnerabilities Flashcards
(5 cards)
OS systems that have not been updated with latest security patches or fixes
Unpatched Systems
Vulnerabilities in software or hardware yet unknown to the developer and not publicly disclosed
Zero-Day Vulnerabilities
Occurs when systems settings are not properly configured, leaving the system vulnerable to exploitation
Misconfiguration
Unauthorized data transfer from within an organization to an external location
Data exfiltration
Mitigation - defense in depth approach including use of encryption and endpoint protection tools like host-based firewalls to control inbound/outbound traffic
Occur when an attacker has been able to craft a malicious update to a well-known and trusted program in order to compromise the systems of the program’s end users
Malicious Updates
Mitigation: only source patches and updates from a trusted vendor and official channels
-Application allow-listing
-verify authenticity of updates using a digital signature or hash