Chapter 1 - introduction To Security Flashcards
End-of-life systems
System for which vendors have dropped all support for security updates due to the systems age
Improper input handling
Software that allows the user to enter data but does not validate or filter user input to prevent a malicious action.
Improper error handling
Software that does not properly trap an error condition and provides an attacker with underlying access to the system.
Race condition
A software occurrence when two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.
Resource exhaustion
A situations in which a hardware device with unlimited resources (CPU, memory, file system storage, etc.) is exploited by an attacker who intentionally tries to consume more resources than intended.
Vulnerable business processes
A situation in which an attacker manipulated commonplace actions that are routinely performed, also called business process compromise.
System sprawl
The widespread proliferation of devices across an enterprise.
Undocumented assets
Devices that are not formally identified or documented in an enterprise. Leads to system sprawl.
Zero day
An attack in which there are no days of warning.
Confidentiality
Security actions that ensure that only authorized parties can view the information
Integrity
Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data.
Availability
Security actions that ensure that data is accessible to authorized users
Information security
That which protects the integrity, confidentiality, and availability of information through products, people, and procedures on the devices that store, manipulate, and transmit the information.
Asset
An item that has value
Ex. Scooter
Threat
A type of action that has the potential to cause harm.
Ex. Theft of scooter
Threat actor
A person or element that has the power to carry out a threat
Ex. Thief