1: 6 Understanding Vulnerability Types Flashcards

1
Q

What is the cybersecurity CIA Triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Protects information from unsecure eyes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Protects information from unauthorized modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Ensures information available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the different types of risks an organization might face due to cybersecurity threats?

A

Financial, Reputational, Strategic, Operational, Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Financial Risk

A

Monetary loss to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Reputational Risk

A

Loss of goodwill due to loss of reputation regarding an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Strategic Risk

A

Jeopardizes the ability to meet our major goals and objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Operational Risk

A

Threatens ability to carry out day-to-day activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compliance Risk

A

Running afoul of regulatory or legal requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

End of Sale

A

Vendor will still support the product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

End of Support

A

Vendor will discontinue some/all support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

End of Life

A

Vendor will no longer release updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 2 risks associated with vendors?

A

Understaffed- Inadequate support for existing products

Embedded Systems not being disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Default Configurations

A

Using misconfigured firewalls, open permissions, default passwords, unsecured root accounts leading to vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the best way to avoid default configuration vulnerabilities?

A

Follow documented security standards and baselines when configuring systems and applications

17
Q

Cryptographic Vulnerabilities

A

Weak cipher suites/weak cryptographic protocol implementations lead to vulnerable communications

18
Q

Patch Management

A

Ensures all systems get patches to avoid vulnerabilities

19
Q

Account Management

A

People can knowingly/accidentally cause damage with too much access

20
Q

Principle of least Privilege

A

Limiting the access of people to the minimum needed to complete their duties

21
Q

Architectural Vulnerabilities

A

Complex systems improperly designed

22
Q

What is the best way to protect against Architectural Vulnerabilities

A

Incorporate security requirements early

23
Q

System Sprawl

A

When devices not being disconnected after their use, leading to vulnerabilities. System sprawl is most dangerous when assets are undocumented .

24
Q

Which triad component does Disclosure Attacks target?

A

Confidentiality

25
Q

Which triad component does Alteration Attacks target?

A

Integrity

26
Q

Which triad component does Denial Attacks target?

A

Availability