1.6: Vulnerabilities Flashcards

1
Q

Zero Day

A

vulnerability has not been detected or published.
CVE: http://cve.mitre.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Weak Encryption

A

Weak encryption protocols can be a source of vulnerability.
Some cipher suites are easier to break than others
Keys less than 128 bit sizes, outdated hashes (md5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Insecure Protocols

A

‘In the clear’ protocols that don’t encrypt data.
FTP, SMTP, IMAP

Encrypted versions should be used: SSH, SFTP, IMAPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Default Settings

A

every app/device has a default ‘login’

Marai botnet takes advantage of default configs consisting of IoT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Open Ports and Services

A

Services open ports, unnecessary open ports are security vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Improper Patch management

A

Centrally managed, update server/endpoint manager usually determine which patches to send.

Not being patched can leave backdoors open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Legacy Platforms

A

Some devices remain installed for too long
outdates software/middleware and now become a security concern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3rd Party Risks

A

Plan for worst possible scenario.
There should be more security, not less.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

System Integration Risk

A

Professional installation and maintenance, can include elevated OS access.
Can be on-site with access to physical devices.
Can run software on the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Supply Chain Risk

A

Cant control security from a 3rd parth location.
Hardware/software from vendor can be counterfit/contain malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly