1.6 Explain the security concerns associated with various types of vulnerabilities. Flashcards
What are Cloudbased vs. onpremises vulnerabilities?
Cloudbased vs. onpremises vulnerabilities refer to security weaknesses or risks associated with cloud-based environments compared to traditional on-premises systems, including issues related to data protection, access controls, network security, and compliance.
What term describes security weaknesses associated with cloud-based environments compared to on-premises systems?
Cloudbased vs. onpremises vulnerabilities
What is a Zeroday vulnerability?
A Zeroday vulnerability is a security flaw or weakness in software or hardware that is exploited by attackers before the developer or vendor releases a patch or fix, leaving users vulnerable to exploitation.
What term describes a security flaw exploited by attackers before a patch is available?
Zeroday
What are Weak configurations?
Weak configurations are security vulnerabilities caused by inadequate or improper settings, permissions, or configurations in software, systems, or networks, which can be exploited by attackers to gain unauthorized access or compromise security.
What term describes vulnerabilities caused by inadequate settings or configurations?
Weak configurations
What are Open permissions?
Open permissions are security risks resulting from excessive or unnecessary access rights granted to users, applications, or services, potentially exposing sensitive data or resources to unauthorized access, modification, or misuse.
What term describes excessive access rights granted to users, applications, or services?
Open permissions
What are Unsecure root accounts?
Unsecure root accounts are security vulnerabilities resulting from weak, default, or unsecured administrator accounts with unrestricted access privileges, which can be exploited by attackers to gain complete control over a system or network.
What term describes weak or default administrator accounts with unrestricted access?
Unsecure root accounts
What are Errors?
Errors are security concerns arising from programming mistakes, software bugs, or human errors that introduce vulnerabilities, weaknesses, or unexpected behaviors in applications, systems, or networks, potentially leading to exploitation or system failure.
What term describes programming mistakes or software bugs leading to vulnerabilities?
Errors
What is Weak encryption?
Weak encryption refers to cryptographic algorithms or keys that provide insufficient protection for sensitive data, making it susceptible to unauthorized access, interception, or decryption by attackers with sufficient computing power or resources.
What term describes cryptographic algorithms or keys providing insufficient protection?
Weak encryption
What are Unsecure protocols?
Unsecure protocols are communication standards or protocols that lack adequate security measures or encryption, making data transmitted over networks vulnerable to interception, eavesdropping, or manipulation by attackers.
What term describes communication standards lacking adequate security measures?
Unsecure protocols
What are Default settings?
Default settings are preconfigured options or configurations in software, devices, or systems that are often insecure or generic, leaving them vulnerable to exploitation if not properly customized or secured by users or administrators.
What term describes preconfigured options that are often insecure?
Default settings
What are Open ports and services?
Open ports and services are network endpoints or applications that are accessible from the internet or other networks, potentially exposing them to unauthorized access, exploitation, or attacks if not properly secured, monitored, or restricted.
What term describes network endpoints accessible from the internet?
Open ports and services
What are Thirdparty risks?
Thirdparty risks are security concerns or vulnerabilities introduced by external vendors, suppliers, or service providers, whose products or services may have access to sensitive data, systems, or networks, posing risks to the security and integrity of organizations.
What term describes security concerns introduced by external vendors or service providers?
Thirdparty risks
What is Vendor management?
Vendor management is the process of overseeing, evaluating, and controlling relationships with external vendors, suppliers, or service providers to ensure their products or services meet security, quality, and compliance requirements and standards.
What term describes overseeing relationships with external vendors to ensure security and compliance?
Vendor management