Hardware Vulnerabilities 2.3 Flashcards

1
Q

[…] devices typically do not have an accessible operating system, but still pose a potential security risk because they are connected to your network

A

IoT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The software / OS inside of hardware that controls it is called […]

A

Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The only entity that can update firmware for hardware is […], assuming they are aware of it and care about fixing it

A

The vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

[…] is when the manufacturer of a product stops selling a product

A

End of Life (EOL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

[…] is when a manufacturer stops selling a product and also stops supporting it

A

End of Service Life (EOSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Regarding […] hardware / software, you should compare the risk of continuing using the device VS the security concerns of keeping it in your network

A

Legacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If legacy devices are critical and cannot be replaced, you can make it safer by
-[…]
-[…]

A
  • Adding additional firewall rules that limits who can connect to it
  • Adding IPS signatures for older operating systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly