Domain 2 : Explain various types of vulnerabilities Flashcards

1
Q

Memory injection

A

These attacks involve the secret insertion of malicious code into a program’s memory space, allowing attackers to exploit vulnerabilities to gain unauthorized access or execute arbitrary commands. Legitimate applications may be susceptible to exploitation and allow attackers to leverage vulnerabilities for unauthorized access, or the execution of arbitrary commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Buffer Overflow

A

A buffer overflow attack occurs when too much water is poured in, causing it to spill over and potentially damage the surrounding area. Similarly, attackers flood a program’s buffer with excessive data, which can overwrite adjacent memory spaces, disrupt program execution, and open doors for unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Race conditions

A

A race condition occurs when two instructions from separate threads attempt to access the same data simultaneously. Ideally, the developer should have programmed the threads to access the data in a sequential manner. To illustrate, consider a scenario where one person is viewing a file’s attributes, while, simultaneously, another person accesses the same file. This phenomenon is referred to as TOC/TOU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malicious update vulnerability

A

A malicious update vulnerability occurs when a seemingly legitimate software update contains hidden code or alterations crafted by malicious actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SQLI

A

SQLI is a type of cyberattack that occurs when an attacker exploits vulnerabilities in a website or an application’s input fields to manipulate the SQL queries executed on the backend database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Query Manipulation

A

If an application doesn’t properly validate or sanitize input, the malicious SQL code becomes a part of the query executed on a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stored Procedure

A

A stored procedure is a database object that encapsulates a sequence of SQL statements. These statements can perform a variety of operations, including data manipulation, queries, and transactions. Stored procedures are stored in the database and can be invoked from applications or other database objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Input validation

A

Validate and sanitize all user inputs before using them in SQL queries. Use parameterized queries or prepared statements, which automatically handle input sanitization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

XSS

A

XSS represents a significant security concern in web applications due to its potential for malicious code injection, executed in the context of a victim’s browser. This can lead to the compromise of user data, session hijacking, and even the defacement of websites. XSS can use the HTML tags and can include JavaScript in between, which can be identified with a .js extension.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firmware

A

Firmware acts as the bridge between hardware and software, controlling the low-level operations of a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VM escape

A

While virtualization is designed to isolate VMs, the hypervisor (that is, the essential software managing these VMs) introduces an unexpected challenge. It can unintentionally create a path for lateral movement, known as moving east to west, and enable potential attackers to move from a secluded VM to the host system or other interconnected VMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Resource reuse

A

While resource sharing is a key advantage of virtualization, improper allocation and management of resources can lead to resource contention and performance issues. If resources such as disks are not properly sanitized before reuse, then sensitive data might be placed on the new VM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VM sprawl

A

VM sprawl refers to the uncontrolled and excessive creation of VMs within a virtualized environment, leading to management challenges, increased resource consumption, and potential security vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud Access Security Broker (CASB)

A

CASB enforces a company’s security policies, bridging the gap between on-premises infrastructure and the dynamic cloud environment. Unlike traditional group policies, the cloud lacks a unified governing mechanism. CASB assumes the crucial role of overseeing all cloud clients, ensuring their security and that all devices are patched. They have visibility across all of the platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Side-channel attacks

A

Cryptographic operations can inadvertently leak information through side-channels such as power consumption, timing, or electromagnetic radiation. Attackers skilled in exploiting these subtle indicators can compromise encryption keys or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSL stripping:

A

SSL stripping is an attack where attackers carry out an SSL downgrade attack and manage to bypass certificate-based protection, turning a session into an HTTP attack. They can then capture data such as credit card information. This is known as an HTTPS downgrade attack.

17
Q

SSL/TLS downgrade

A

In an SSL/TLS downgrade attack, SSL traffic is intercepted by a server pretending to have an older, less secure browser. To communicate with that server, SSL switches to a weaker (supposedly compatible) encryption method, and it is then easy for hackers to see private information.

18
Q

Jailbreaking

A

Jailbreaking applies specifically to Apple devices and allows users to bypass manufacturer or operating system restrictions, providing more control over the device. This is commonly known as unlocking a device. This freedom, however, exposes the device to significant security risks.

19
Q

Sideloading

A

Sideloading is generally associated with Android devices utilizing Android Application Package (APK) files. While applications can also be sideloaded on Apple devices, the practice directly violates Apple’s terms and conditions and voids the device’s warranty.

20
Q

Rooting

A

Rooting allows users to bypass manufacturer or operating system restrictions on Android devices, providing more control over a device. This is commonly known as unlocking a device. This freedom, however, exposes the device to significant security risks.

21
Q

Malware

A

Malware (short for “malicious software”) refers to any software program or code that is specifically designed to disrupt, damage, or gain unauthorized access to computer systems, networks, or devices.

22
Q

Malware

A

Malware (short for “malicious software”) refers to any software program or code that is specifically designed to disrupt, damage, or gain unauthorized access to computer systems, networks, or devices.

23
Q

Trojan

A

A Trojan can also use Portable Executable (PE) files, which are a common file format used for executable and binary files in Windows operating systems. These files contain executable code and data that can be run by the Windows operating system but require the user to give permission via a User Account Control (UAC) window. PE files can be embedded inside legitimate software or software packages.

24
Q

Race conditions

A

A race condition occurs when two instructions from separate threads attempt to access the same data simultaneously. Ideally, the developer should have programmed the threads to access the data in a sequential manner. To illustrate, consider a scenario where one person is viewing a file’s attributes, while, simultaneously, another person accesses the same file. This phenomenon is referred to as TOC/TOU. In this situation, the individual accessing the file might modify its data, inadvertently overwriting the information being viewed by the first person.

25
Q

Dos amplified

A

Amplified: Network-amplified attacks harness the power of a fundamental principle in network communications, which is the ability to send a small request that triggers a much larger response. This principle, when maliciously exploited, leads to the amplification of traffic directed at the victim. Attackers capitalize on protocols that generate significant responses for minimal input, such as the Internet Control Message Protocol (ICMP).

26
Q

Deauthentication and jamming

A

Deauthentication and jamming attacks: Wireless attacks can involve deauthentication and jamming techniques to disrupt legitimate network services. Jamming is illegal and blocks the victim from accessing the WAP. A deauthentication attack (also known as a disassociation attack) is launched when an attacker sends specially crafted deauthentication frames to one or more devices connected to a Wi-Fi network to disconnect the target computer from the network. These techniques can also be used in a wireless DoS attack.

27
Q

Software-Defined Wide Area Network

A

A software-defined wide area network (SD-WAN) is a virtual WAN architecture that allows enterprises to leverage any combination of transport services — including MPLS, LTE and broadband internet services — to securely connect users to applications.

28
Q

Host based firewalls

A

Host-based firewall: Host-based firewalls are software firewalls that run on individual devices. They monitor and control incoming and outgoing network traffic at the device level, preventing unauthorized access and malicious activities. These firewalls can protect laptops when the user is working away from home.

29
Q

Advanced Persistent Threat (APT

A

An APT is a sophisticated and focused cyberattack launched by well-funded and highly skilled opponents, such as nation-backed agents or organized cybercriminal groups. APTs are recognized for their ability to break into a specific system or network, stay hidden for a long time, and quietly steal important data or cause damage bit by bit over an extended period.

30
Q

Conditional Access Policy

A

A Conditional Access policy is a cloud-based access control that uses signals, conditions, and enforcement mechanisms to manage and regulate user access to resources, enhancing security and ensuring compliance.

31
Q

Data Steward

A

: Data stewards are dedicated to maintaining data quality, diligently identifying and rectifying errors and inconsistencies. They also maintain detailed records and metadata, making data understandable and accessible to users. Beyond quality, they classify data based on sensitivity and collaborate with data custodians to implement the necessary controls for compliance.

32
Q

Data Owners

A

Data owners bear the responsibility of safeguarding data and overseeing the enforcement of policies that govern its proper usage to ensure the protection and responsible handling of data.

33
Q

Master Service Agreement (MSA

A

States general terms for prolonged collaboration

34
Q

Master Service Agreement (MSA

A

The MSA articulates the general terms and conditions governing a contractual relationship between the involved entities. It typically addresses aspects such as payment terms, dispute resolution mechanisms, intellectual property rights, confidentiality clauses, and liability provisions.

35
Q

Work Order (WO)/Statement of Work (SOW)

A

: While an MSA outlines the terms and conditions of a contracted partnership, a WO or SOW looks at the specifics of individual tasks or projects. The SOW typically provides a detailed breakdown of the work to be performed, the timelines for completion, the expected deliverables, and the agreed-upon compensation.

36
Q

DCHP

A

) is a network management protocol used to dynamically assign an IP address to any device, or node, on a network so it can communicate using IP.