1.6 Explain the security concerns associated with various types of vulnerabilities Flashcards

1
Q

Newly discovered attacks for which there is no specific defense available from the vendor of the vulnerable product.

A

Zero day attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Increases the risk of data loss, data leakage, and overall system compromise, when this is allowed to remain while a system is in active productive use.

A

Misconfiguration/ weak configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A risk management tool that can protect a company against the failure of a third-party software developer.

A

Software escrow agreement (SEA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The risks incurred when an organization depends on custom developed software or software products produced through outsourced code development.

A

Outsourced code development risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The risks incurred when working with a third-party data storage entity. Requirement must be defined in the SLA. Control over uploaded, backup, and archival data is maintained by encrypting it before it is transferred to the third-party storage solution.

A

Data storage risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Can include, but not limited to data loss/breach/exfiltration, identity theft, financial, reputation, and availability loss.

A

IT/IS impacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly