Vulnerabilities And Attack Flashcards

1
Q

What is a Vulnerability?

A

A weakness or flaw in hardware, software, configurations, or processes.

漏洞是指硬件、软件、配置或流程中的弱点或缺陷。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can vulnerabilities lead to?

A

• Unauthorized Access
• Data Breaches
• System Disruptions

漏洞可能导致未授权访问、数据泄露或系统中断。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Attack in cybersecurity?

A

A deliberate action by a threat actor to exploit vulnerabilities.

攻击是威胁行为者故意利用漏洞的行为。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are common forms of attacks?

A

• Unauthorized Access
• Data Theft
• Malware Infections
• Denial-of-Service (DoS)
• Social Engineering

常见攻击形式包括:未授权访问、数据盗窃、恶意软件感染、拒绝服务攻击和社会工程学。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are common hardware vulnerabilities?

A

• Firmware flaws
• End-of-life systems
• Missing patches
• Misconfigurations

常见硬件漏洞包括固件缺陷、生命周期结束设备、缺少补丁和配置错误。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you mitigate hardware vulnerabilities?

A

• Harden systems
• Apply patches
• Enforce baseline configurations
• Decommission outdated devices
• Isolate risky components

应对方法包括系统加固、打补丁、强制基线配置、退役旧设备和隔离高风险组件。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are common Bluetooth attacks?

A

• Bluesnarfing
• Bluejacking
• Bluebugging
• Bluesmack
• BlueBorne

蓝牙攻击包括:蓝牙窃取、蓝牙骚扰、蓝牙劫持、蓝牙拒绝服务攻击和蓝牙空中传播。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are common mobile vulnerabilities?

A

• Sideloading apps
• Jailbreaking / Rooting
• Insecure connections (e.g., public Wi-Fi)

常见的移动设备漏洞包括侧载应用、越狱/Root 和不安全连接。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you mitigate mobile vulnerabilities?

A

• Patch Management
• Use Mobile Device Management (MDM)
• Prevent sideloading

补救措施包括打补丁、使用移动设备管理系统、禁止侧载应用等。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Zero-Day Vulnerability?

A

A newly discovered vulnerability with no patch or defense available.

零日漏洞是指尚未有补丁或防御措施的新发现漏洞。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are common OS vulnerabilities?

A

• Unpatched systems
• Zero-days
• Misconfigurations
• Data exfiltration
• Malicious updates

操作系统漏洞包括:未打补丁、零日漏洞、配置错误、数据外泄和恶意更新。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to protect an OS from vulnerabilities?

A

• Apply patches
• Use configuration management
• Use encryption
• Deploy endpoint protection and firewalls
• Use IPS and access controls

防护措施包括打补丁、配置管理、加密、端点防护、防火墙、IPS 和访问控制。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an SQL Injection attack?

A

It exploits database or web app vulnerabilities by inserting malicious SQL commands.

SQL 注入是通过插入恶意 SQL 语句来利用数据库或 Web 应用漏洞。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an XML Injection attack?

A

It targets the XML processing of web apps by injecting malicious XML structure or entities.

XML 注入是向 XML 数据中插入恶意内容,从而操控系统解析或盗取信息。

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bluetooth Vulnerability include:

A

1.insecure pairing
2.Device spoofing
3.On-path attacks

不安全配对
设备欺诈连接,假扮
路径攻击,在设备连接的过程中窃取信息

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Best practice for secure Bluetooth usage

A

Turn off Bluetooth when not in use
Set non discoverable
Regularly update firmware
Only pair with known device
Use unique PIN
Use encryption for sensitive date

17
Q

What is XSS (Cross-Site Scripting)?

A

Injecting malicious scripts into web pages to attack users.

中文:跨站脚本攻击(XSS)是把恶意脚本塞进网页里,害访问网页的人。

18
Q

What is the goal of XSS attacks?

A

To steal data like cookies, hijack sessions, or redirect users.

中文:XSS攻击的目的是偷数据(比如Cookies)、劫持登录状态,或者把用户骗去假网站。

19
Q

What is CSRF (Cross-Site Request Forgery)?

A

Tricking a user’s browser to send unauthorized actions without their knowledge.

中文:跨站请求伪造(CSRF)是骗你的浏览器,偷偷用你的身份发指令。

20
Q

What is the goal of CSRF attacks?

A

To perform actions like changing passwords, transferring money, or posting without user consent.

中文:CSRF攻击的目的是改密码、转账、发帖,而且受害者自己都不知道。

21
Q

What is a Buffer Overflow?

A

Writing too much data into a small memory space, causing crashes or allowing code execution.

中文:缓冲区溢出就是往内存小盒子里塞太多东西,导致程序崩溃或被黑客控制。

22
Q

Why is Buffer Overflow dangerous?

A

Attackers can overwrite memory and make the system run their malicious code.

中文:黑客可以趁溢出来改掉内存里的指令,让电脑执行恶意程序。

23
Q

What is a Race Condition?

A

When two operations happen at the same time and mess up shared resources.

中文:竞态条件就是两个动作抢着操作同一个资源,结果搞出混乱。

24
Q

Why are Race Conditions dangerous?

A

Attackers can exploit timing issues to bypass security checks or steal data.

中文:黑客可以利用时机差错,绕过安全检查,或者偷走重要数据。

25
What is TOC (Time of Check)?
The moment when the system checks the status of a resource. ## Footnote 中文:TOC(检查时间)是系统检查资源状态的那一刻。
26
What is TOU (Time of Use)?
The moment when the system actually uses the resource after checking it. ## Footnote 中文:TOU(使用时间)是系统真正使用资源的那一刻。
27
What is TOE (Target of Evaluation)?
The resource being checked and used, like a file, account, or database. ## Footnote 中文:TOE(评估目标)是被检查或使用的对象,比如文件、账户或数据库。