1.6 - Vulnerabilities Flashcards

1
Q

Define Zero-day attacks.

A

A vulnerability that has not yet been detected or published. It is a brand new vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Open permissions as a vulnerability.

A

Permission that are not restricted. This is more common within cloud storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Unsecured root accounts as a vulnerability.

A

A Linux root account is the administrator or superuser account. It can be unsecured by misconfiguration or an easy-to-hack password.

Disable direct login to the root account. Use su or sudo. Protect accounts with root or administrator access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Errors as a vulnerability.

A

Error messages can provide useful information to an attacker (service type, version information, debug data, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Weak Encryption as a vulnerability.

A

Using deprecated encryption protocol. Issues can arise from the length of the encryption key, the hash, and wireless encryption.

Some cipher suites are easier to break than others. TLS is one of the most common issues. You don’t want to use weak or null encryption (less than 128 bit key sizes) or outdated hashes (MD5).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Insecure Protocols as a vulnerability.

A

Cleartext or non-encrypted protocols.
Telnet, FTP, SMTP, IMAP

Use the encrypted versions (SSH, SFTP, IMAPS, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Default Settings as a vulnerabilty.

A

Using default usernames and passwords in order to login rather than changing them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Open Ports and Services as a vulnerability.

A

The more ports and services that are opened, the more space there is for sketchy traffic to get through.

Manage with a firewall. Allow or deny based on port number or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Improper Patch Management as a vulnerability.

A

Can leave devices and applications open to zero-day attacks and older vulnerabilities. Can be firmware, OS, or applications.

Should centrally manage updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Legacy Systems as a vulnerability.

A

Devices that have long been deprecated, so they are no longer updated or supported. They are weak to attack because all of their vulnerabilities are known.

They might be running software that is EOL.

Additional firewall rules. IPS signature rules for older OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List some of the risks of working with a third party that does system integration.

A

Professional installation and maintenance

Risks
- Can be on-site
- Physical or virtual access to data and systems
- Keylogger installations and USB flash drive data
transfers
- Can run software on the internal network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List some of the risks of a Lack of Vendor Support.

A

Vendors are the only ones who can fix their products.

They need to know about the problem. Security problems can result from no updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List some of the risks of working with a third party that is a Supply Chain.

A

You cannot control security at a third-party location. Hardware and software from a vendor can contain malware. There is also counterfeit hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List some of the risks of working with a third party that you Outsource code development to.

A

Third party has access to code base. Might have internal access via VPN. Make sure there are no backdoors.

Verify security to other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List some of the risks of working with a third party that handles your Data Storage.

A

Data could be highly sensitive. Storage at third-party may need encryption. Physical access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List some ways a vulnerability can have an impact.

A

1) Economic
2) Data loss
3) Identity theft
4) Financial loss
5) Reputation
6) Availability loss

17
Q
A