third party and supply chain Flashcards

(14 cards)

1
Q

What is third-party risk in cybersecurity?

A

Risk involving external entities like service providers or software suppliers that affect your systems or data, categorized as outsourcing, insourcing, or mixsourcing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is outsourcing in cybersecurity?

A

When a company (X) gets another (Z) to process its customer’s (Y’s) data externally, increasing risk visibility and legal complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What example illustrates outsourcing risk?

A

The SITA breach exposed airline passenger data because of obscure infrastructure outsourcing, affecting StarAlliance and OneWorld airlines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is insourcing in cybersecurity?

A

Using external software (from Z) within your systems to process customer (Y) data, which may carry hidden security flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What challenge arises with insourced software?

A

Security flaws may be undocumented, and users typically lack access to the source code to perform audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does mixsourcing refer to?

A

A hybrid where software or service from a third party plays a role in internal processes in non-obvious ways, blurring responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was the cause of the 2013 Target data breach?

A

Attackers exploited credentials from HVAC vendor Fazio to access internal networks, leading to point-of-sale malware deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why was the Target breach an example of mixsourcing risk?

A

A non-obvious third party had indirect access, and lack of network segmentation allowed attackers to reach sensitive systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What was the consequence of the Ticketmaster breach?

A

Inbenta’s chatbot script was hacked, leading to a fine and lawsuits. Ticketmaster was held responsible despite third-party involvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is dependency confusion?

A

A supply chain attack where public repositories serve malicious packages with the same name as internal ones, exploiting version priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What popular languages/tools are vulnerable to dependency confusion?

A

NPM, PyPI, RubyGems, and others that auto-resolve package dependencies by version number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Log4j vulnerability?

A

A critical remote code execution flaw in a logging library widely used across thousands of Java applications, easily exploitable via user input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why was the Log4j vulnerability so dangerous?

A

It affected many software systems globally and was deeply embedded in dependency chains, making patching urgent and complex.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a historical example of a supply chain attack in Linux?

A

In 2003, attackers tried to insert a backdoor in the Linux kernel source code using a sneaky assignment operator, prompting Git’s creation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly