1.6 Explain the security concerns associated with various types of vulnerabilities Flashcards
Newly discovered attacks for which there is no specific defense available from the vendor of the vulnerable product.
Zero day attacks
Increases the risk of data loss, data leakage, and overall system compromise, when this is allowed to remain while a system is in active productive use.
Misconfiguration/ weak configuration
A risk management tool that can protect a company against the failure of a third-party software developer.
Software escrow agreement (SEA)
The risks incurred when an organization depends on custom developed software or software products produced through outsourced code development.
Outsourced code development risks
The risks incurred when working with a third-party data storage entity. Requirement must be defined in the SLA. Control over uploaded, backup, and archival data is maintained by encrypting it before it is transferred to the third-party storage solution.
Data storage risks
Can include, but not limited to data loss/breach/exfiltration, identity theft, financial, reputation, and availability loss.
IT/IS impacts