1.6 Explain the security concerns associated with various types of vulnerabilities Flashcards
Zero-Day
A never before seen vulnerability. No way to patch it
Open Permission
Unsecured data that is left open to the public.
Unsecured Root Account
A admin account that is compromised. Due to weak passwords
Errors
Error message that have to much information. Error message list Service type, version info, debug data.
Weak encryption
Protocols, hashes, and length of encryption key are out dated or already have a exposed vulnerability.
Unsecure Protocols
Protocols that aren’t encrypted. Data that is displayed in the clear.
Default Settings
Uses the default username and password.
Open ports and services
Server that has no Firewall or Network fire wall.
Improper or weak patch management
Not patching the Firmware, OS, or applications. Causes data breaches.
Legacy Platforms
Old systems that cant be easily upgraded.
System Integration
Professional and maintenance team that have admin and physical access to your network.
Lack of vendor support
Vendors that do not put/take a long time to patch vulnerabilities.
Supply Chain Risk
Not in control of security from third party locations.
Outsourced code
Code that is developed by third party needs to secure. Code needs to checked for vulnerabilities
Data Storage
Storing data at at third party location needs to be encrypted. Also the way the date is being transferred needs to be secured.