1.6 Various types of vulnerabilities Flashcards
zero-day
Attacks that exploit known vulnerabilities. These are dangerous because they are unknown to product vendors, and no patches are available to correct them.
Weak configurations
These are weak settings that may jeopardize security.
1. The use of default settings that pose a security risk
2. The presence of unsecured accounts
3. Open ports and services that are not necessary to support normal system operations.
4. Open permissions that allow users access that violates the principle of least privilege
open permissions
These allow users access that violates the principle of least privilege
unsecure root accounts
This is an account with admin privileges
weak encryption
A weak encryption may be easily defeated by an attacker. These can be encryption keys that are easily guessable due to its length or composition.
unsecure protocols
These are protocols that fail to use encryption to protect usernames, passwords etc. Telnet is an unsecure protocol used to gain command line access to a remote server.
default settings
This can include admin setup pages that are meant to be disabled before moving a system into production
open ports and services
This is an example of a weak configuration
Firmware
This is the replacement for the traditional basic input/output system BIOS