1.6 - Vulnerabilities Flashcards
Define Zero-day attacks.
A vulnerability that has not yet been detected or published. It is a brand new vulnerability.
Define Open permissions as a vulnerability.
Permission that are not restricted. This is more common within cloud storage.
Define Unsecured root accounts as a vulnerability.
A Linux root account is the administrator or superuser account. It can be unsecured by misconfiguration or an easy-to-hack password.
Disable direct login to the root account. Use su or sudo. Protect accounts with root or administrator access.
Define Errors as a vulnerability.
Error messages can provide useful information to an attacker (service type, version information, debug data, etc.).
Define Weak Encryption as a vulnerability.
Using deprecated encryption protocol. Issues can arise from the length of the encryption key, the hash, and wireless encryption.
Some cipher suites are easier to break than others. TLS is one of the most common issues. You don’t want to use weak or null encryption (less than 128 bit key sizes) or outdated hashes (MD5).
Define Insecure Protocols as a vulnerability.
Cleartext or non-encrypted protocols.
Telnet, FTP, SMTP, IMAP
Use the encrypted versions (SSH, SFTP, IMAPS, etc.)
Define Default Settings as a vulnerabilty.
Using default usernames and passwords in order to login rather than changing them.
Define Open Ports and Services as a vulnerability.
The more ports and services that are opened, the more space there is for sketchy traffic to get through.
Manage with a firewall. Allow or deny based on port number or application.
Define Improper Patch Management as a vulnerability.
Can leave devices and applications open to zero-day attacks and older vulnerabilities. Can be firmware, OS, or applications.
Should centrally manage updates.
Define Legacy Systems as a vulnerability.
Devices that have long been deprecated, so they are no longer updated or supported. They are weak to attack because all of their vulnerabilities are known.
They might be running software that is EOL.
Additional firewall rules. IPS signature rules for older OS.
List some of the risks of working with a third party that does system integration.
Professional installation and maintenance
Risks
- Can be on-site
- Physical or virtual access to data and systems
- Keylogger installations and USB flash drive data
transfers
- Can run software on the internal network
List some of the risks of a Lack of Vendor Support.
Vendors are the only ones who can fix their products.
They need to know about the problem. Security problems can result from no updates.
List some of the risks of working with a third party that is a Supply Chain.
You cannot control security at a third-party location. Hardware and software from a vendor can contain malware. There is also counterfeit hardware.
List some of the risks of working with a third party that you Outsource code development to.
Third party has access to code base. Might have internal access via VPN. Make sure there are no backdoors.
Verify security to other systems.
List some of the risks of working with a third party that handles your Data Storage.
Data could be highly sensitive. Storage at third-party may need encryption. Physical access.