1.8Vulnerability impact Flashcards

1
Q

race conditions

A

The behavior of a software electronic, or another systems output is dependent on the timing, sequence of events, or a factor out of the users control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

End of life systems

A

no longer receives updates, and at a high risk for compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Embedded systems

A

Programs added for automation and/or monitoring. can allow for malicious programs to gain access through the added programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

lack of vendor support

A

vendor does not support the product.does not update, improve, or protect the product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Improper input handling

A

The system does not properly validate data, allows for the attacker to create an input that is not expected. Allows for parts of the system vulnerable to unintended data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Improper error handling

A

The error message displays sensitive or private information that give the user too much data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Default configuration

A

uses unsecure out of the box settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Resource exhaustion

A

a denial of service occurs, the amount of resources to execute an action are expended, making it unable for the action to be performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Untrained Users

A

Users are not properly informed on how to use the systems. This means mistakes will more than likely occur and that the system’s resources may be abused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Improperly configured accounts

A

Users should only be able to access the parts that they need to complete their work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerable business processes

A

All tasks, procedures and functions should be properly assessed and the most valuable and vulnerable should be heavily protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Weak cipher suites and integration

A

Use of older and less robust cryptographic algorithms. i.e. DES, WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

memory leak

A

Leaves the system unresponsive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Integer overflow

A

large integer exceeds data storage capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

buffer overflow

A

Too much data for the computers memory to buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pointer dereference

A

Failed dereference can cause memory corruption and the application to crash

17
Q

DLL injection

A

Allows for the running of outside code

18
Q

System Sprawl/Undocumented assets

A

lask of internal inventory and allowing unsecured devices to connect to the network

19
Q

Architecture/design weakness

A

and insecure, or poorly designed network. i.e. not segmenting the systems of internal network

20
Q

New threats/zero day

A

a flaw that is unknows to the teams patching and fixing the flaws

21
Q

Improper certificate and key management

A

allows for unauthorized access to certificates and keys, which allows for sensitive data to be decrypted. and allowing for certificates to expire