2.4 - Security Vulnerabilities Flashcards
1
Q
Non-compliant systems
A
- A constant challenge
– There are always changes and updates - Standard operating environments (SOE)
– A set of tested and approved
hardware/software systems
– Often a standard operating system image - Operating system and application updates
– Must have patches to be in compliance
– OS updates, anti-virus signatures
– Can be checked and verified before access is given
2
Q
Protecting against non-compliant systems
A
- Operating system control
– Apply policies that will prevent
non-compliant software - Monitor the network for application traffic
– Next-generation firewalls with application visibility - Perform periodic scans
– Login systems can scan for non-compliance
– Require correction before the system is given access
3
Q
Unpatched systems
A
- Microsoft Patch Tuesday
– Second Tuesday of each month (10:00 AM PST) - Suddenly, systems are vulnerable to security flaws
– Patch the operating system and applications - An organization might have thousands of systems
– Some of those are major services - One forgotten system may be the weakest link
– This happens quite a bit - Patch management is a critical practice
– Test, prioritize, and deploy
4
Q
Unprotected systems
A
- Security issues are often roadblocks
– Applications may not work properly without
additional configurations - Some troubleshooting tasks can be insecure
– Disable antivirus and try again
– Disable the firewall and try again - Permanently disabling security isn’t the answer
– You don’t fix a bad door lock by removing the door
– Become an expert in application troubleshooting
5
Q
Product support lifetime
A
- End of life (EOL) operating systems
– Manufacturer stops selling an OS
– May continue supporting the OS
– Important for security patches and updates - End of service life (EOSL)
– Manufacturer stops selling an OS
– Support is no longer available
– No ongoing security patches or updates
– May have a premium-cost support option - Technology EOSL is a significant concern
– Security patches are part of normal operation
6
Q
BYOD
A
- Bring Your Own Device / Bring Your Own Technology
- Employee owns the device
– Need to meet the company’s requirements - Difficult to secure
– It’s both a home device and a work device
– How is data protected?
– What happens to the data when a device is
sold or traded in?
– An infected device could disclose proprietary
company information