Chapter 1.6 Flashcards
race condition
A race condition vulnerability is found where multiple threads are attempting to write at the same memory location. Race conditions have been used as an anti-virus evasion technique.
integer overflow
An integer overflow attack causes the target software to calculate a value that exceeds the upper and lower bounds.
buffer overflow
A buffer overflow is an application attack that exploits fixed data buffer sizes in a target piece of software by sending data that is too large for the buffer.
pointer dereference
Pointer dereference is a software vulnerability that can occur when the code attempts to remove the relationship between a pointer and the thing it points to (pointee). Dereferencing may crash the application and corrupt memory.
MEF
A mission essential function (MEF) is one that cannot be deferred. This means that the organization must be able to perform the function as close to continually as possible, and if there is any service disruption, the mission essential functions must be restored first.
IAM
IAM is a security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets.
memory leak
Memory leaks in the OS kernel are extremely serious. A memory leak may itself be a sign of a malicious or corrupted process.
DLL injection
DLL injection is not a vulnerability, but of the way the operating system allows one process to attach to another, and then force it to load a malicious link library.
PIN
Cisco’s SAFE architecture is a good starting point for understanding the complex topic of network architecture design. The SAFE guidance refers to Places In the Network (PIN)
pinch point
A single point of failure (a “pinch point”), relies on a single hardware server or appliance or network channel.