Misconfiguration Vulnerabilities 2.3 Flashcards
A very common misconfiguration someone might make is not putting any […] on data, leaving it open for anyone to view / modify
Permissions
[…] allows an attacker to have full control over an environment. Prevent this by not having an intentionally easy-to-hack or simple password
Unsecure Admin Accounts
Best practice involves […] direct access to the admin account so that a user must go through a UAC prompt and enter the admin credentials there.
Disabling
Another best practice to protect administrator access is by […] how many accounts actually have admin rights
Limiting
[…] create a security risk due to there being no encryption involved, all traffic is sent in the clear
Insecure Protocols
New applications and network devices usually come with a preset login, called […], which should be changed immediately upon setup
Default Credentials
It’s possible for […] to pose a risk, which can be managed using a firewall to control traffic flows
Open Ports and Services