1.6 Flashcards
Explain the security concerns associated with various types of vulnerabilities.
Weaknesses or security flaws present in cloud computing environments, services, or applications. _____________ may arise due to misconfigurations, insecure APIs, inadequate access controls, or vulnerabilities in underlying infrastructure, potentially exposing sensitive data or resources to unauthorized access or exploitation.
Cloud-based vulnerabilities
Pertain to weaknesses or security flaws in locally hosted systems, networks, or applications within an organization’s physical premises.
On-premises
vulnerabilities
Is a cyber-attack that exploits a previously unknown vulnerability or software flaw for which no patch or fix is available from the software vendor.
Zero-day attack
Refers to the network of entities, vendors, suppliers, and partners involved in the development, manufacturing, distribution, and delivery of products and services within an organization’s ecosystem. Risks arise when vulnerabilities in this chain are exploited by attackers.
Supply chain
Are outdated technology systems, applications, or software that are still in use within an organization.
Legacy platforms
The unintentional loss of data, resulting in its permanent or temporary unavailability or inability to be accessed.
Data loss
A ______________ occurs when unauthorized individuals gain access to sensitive information without authorization. ____________ may involve the theft, exposure, or unauthorized disclosure of personal, financial, or proprietary data, potentially leading to identity theft, financial fraud, reputational damage, and regulatory penalties for organizations.
Data breaches
_________________ refers to the unauthorized extraction of sensitive data from an organization’s systems to an external location controlled by attackers.
Data exfiltration
Is a type of cybercrime in which attackers steal and misuse individuals’ personal information for fraudulent purposes.
Identity theft
Refers to the disruption of access to data, systems, or services, rendering them unavailable to authorized users. This leads to downtime, productivity losses, and negative impacts on business operations.
Availability loss