1.6 Explain The Security Concerns Associated With Various Types Of Vulnerabilities Flashcards

1
Q

Cloud-based vs. on-premises vulnerability

A

The physical component of on-premises vulnerability and attacks doesn’t apply to cloud-based vulnerabilities and attacks. All the network-specific vulnerabilities and attacks to exploit those vulnerabilities apply to cloud-based and on-premises networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a zero-day?

A

A zero-day attack is a previously unknown attack that hasn’t been analyzed for mitigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a weak configuration?

A

Weak configuration fail to take Advantage off the full strength offered by a system or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are open permissions?

A

Essentially open permissions equate to no security at all for any accessible system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are unsecure root accounts?

A

They are typically local administrator with no password, or any elevated accounts with with no password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are errors in regards to weak configuration?

A

Errors can be useful to that actors to gain insight to vulnerabilities, software, and ways to exploit these vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is weak encryption?

A

Is a form of weak configuration because threat actors are working to crack encryption and get access to their info.

Avoid weak or null encryption (less than 128 bit key sizes), outdated hashes (MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are unsecure protocols?

A

These are protocols that are unencrypted and data is transferred in plaintext(Telnet, FTP, SMTP, IMAP).

Verify with a packet capture to view everything sent over the network.

You can reconfigure an application to use the encrypted version(SSH, SFTP, IMAPS, etc).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are default settings?

A

Every application and network device has a default login. Some people never change the default username and password and attackers take advantage of this.

Example is a botnet that takes over devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the security risks of open ports and services?

A

Opening these ports and services means opening up the door for access to the server.

We can manage this access usually with a firewall to facilitate traffic flows, allow or deny based on application or port number.

One downside is that these firewall rulesets can become complex. Need to be audited to check.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are third-party risks?

A

Third-party risks are those where you can’t properly handle security of third-party access, but rather focus on securing your own better.

There should be more security in place for third-party access to your systems. Always be prepared for a breach.
Everyone needs to use the IT security best practices.
Physical and cybersecurity should go hand-in-hand to work together to ensure better security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a system integration risk regarding vendor management?

A

A third-party can have access to elevated OS access, they can be on-site with physical or virtual access to data and systems. They can install keyloggers and do USB flash drive data transfers. They are already past all the firewalls and physical security so they can run port scanners, traffic captures, inject malware and spyware, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are third-party risks of Lack of Vendor support?

A

Vendors need to be aware that there is always a possibility for a vulnerability. Vendors are the only ones that can fix the vulnerability on their own products; they need to be aware it exists and care enough to fix it. Vendors need to be aware of these problems and be able to react to them in a timely manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are third-party risks with Supply chain?

A

Almost everything you buy and install comes from a third-party. Before you deploy any of these items on your systems, you need to make sure that you have proper security controls on your own systems first. Hardware and software from a vendor can contain malware. You have to inspect the hardware from a third-party company to monitor everything and to react to any potential attack from a supply chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What third-party risks with Outsourced code development?

A

Not every org has the resources to do in-house development. You need to decide where to have the code stored. If in-house, you need to have the developers use a VPN, or you may want it on a centralized cloud-based server. For both, you need to make sure you are putting in the correct security controls for where the data happens to be and where people are accessing it. You also need to isolate where the code is stored and where developers are working from the rest of the network. Once the code is completed, it needs to be checked for backdoors and validate data protection and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Third-party risks with Data storage?

A

You need to consider the type of data that is being stored. It can have contact information, and other PII on it. There may be mandates in place for storage at a third-party for encryption to be in place to add complexity and limit exposure. You need to be sure that transferring of data is all done with encryption.

17
Q

What are security concerns with improper or weak patch management?

Firmware
Operating System
Applications

A

Patches are usually centrally managed by an update server. It is also important to test all of your apps, then deploy the patches. Most patches are associated with security vulnerability.

Improper patch management can allow attackers to get in an steal data and litigation can ensue if there wasn’t any proper procedures in place to keep all systems patched.

18
Q

What are security concerns with legacy platforms?

A

Legacy systems may be running on end-of-life software that has older operating systems, applications, and middleware and naturally have weaker built-in security.

These legacy devices may require additional security protections like extra firewall rules, IPS signature rules for older operating systems

19
Q

What are the vulnerability impacts over data loss, data breaches, and data exfiltration?

A

Loss of data can sometimes be worth more than money if data is deleted without having a backup to recover that data. Data could be sold or exposed to individuals who can make money or further commit crimes against those victims.

20
Q

What are the vulnerability impacts over identity theft?

A

Attackers can take the data that is exposed and use it for their own purposes. With access to PII, these attackers are then able to steal their identity and create more problems for all the people affected by the theft.

21
Q

What are the vulnerability impacts over financial loss?

A

Self-explanatory but a lot of money can be taken from companies that have vulnerabilities. An example was that the Bank of Bangladesh lost 81 million dollars due to attackers sending secure messages to transfer money in reserves to accounts in the Philippines and Sri Lanka.

22
Q

What are the vulnerability impacts over reputation?

A

It can make your organization look really bad and lose value, especially in the stock market. There are some laws that require a company to disclose security breaches.

23
Q

What are the vulnerability impacts over availability loss?

A

Systems can become unavailable and an example would be ransomware that shuts down large networks and keeps them down until the hackers are paid to start them up again.