Hardware Vulnerabilities 2.3 Flashcards
[…] devices typically do not have an accessible operating system, but still pose a potential security risk because they are connected to your network
IoT
The software / OS inside of hardware that controls it is called […]
Firmware
The only entity that can update firmware for hardware is […], assuming they are aware of it and care about fixing it
The vendor
[…] is when the manufacturer of a product stops selling a product
End of Life (EOL)
[…] is when a manufacturer stops selling a product and also stops supporting it
End of Service Life (EOSL)
Regarding […] hardware / software, you should compare the risk of continuing using the device VS the security concerns of keeping it in your network
Legacy
If legacy devices are critical and cannot be replaced, you can make it safer by
-[…]
-[…]
- Adding additional firewall rules that limits who can connect to it
- Adding IPS signatures for older operating systems