1.6 Explain the security concerns associated with various types of vulnerabilities Flashcards
Cloud-based vs. on-premises vulnerabilities
Zero-day
Weak configurations
-Open permissions
Weak configurations
-Unsecure root accounts
Weak configurations
-Errors
Weak configurations
-Weak encryption
Weak configurations
-Unsecure protocols
Weak configurations
-Default settings
Weak configurations
-Open ports and services
Third-party risks
-Vendor management/system integration/lack of vendor support
Third-party risks
-Supply chain
Third-party risks
-Outsourced code development
Third-party risks
-Data storage
Improper or weak patch management
-Firmware
Improper or weak patch management
-Operating system (OS)
Improper or weak patch management
-Applications
Legacy platforms
Impacts
-Data loss
Impacts
-Data breaches
Impacts
-Data exfiltration
Impacts
-ID theft
Impacts
-Financial
Impacts
-Reputation