Módulo 07 - Vulnerability Management Flashcards
Define: Vulnerability Management
A: The process of
1. identifying,
2. evaluating,
3. treating
4. reporting
vulnerabilities to prevent exploitation
Define: End-of-Life (EOL) Systems
A: Products or systems that are no longer supported by the manufacturer or vendor, receiving no updates or security patches, making them vulnerable to new threats.
Define: Legacy Systems
A: Outdated computer systems or applications that are still in use despite their limitations, often due to the high cost or risk associated with replacing them.
Define: Firmware Vulnerabilities
A: Security flaws within the foundational software that controls hardware, which can be exploited to gain unauthorized access or persist on a system undetected.
Define: Meltdown and Spectre
A: Critical vulnerabilities discovered in 2018 affecting nearly all CPUs, allowing malicious programs to steal data being processed on the computer.
Define: LoJax
A: A malware discovered in 2018 that infects the UEFI firmware, allowing attackers to maintain persistence even after hard drive replacements or OS reinstallations.
Define: Vulnerability Scanning
A: The use of specialized tools to automatically identify potential security weaknesses in an organization’s digital assets.
Define: Shellshock
A: A significant vulnerability in the Bash shell affecting Unix-based systems, including macOS, allowing attackers to execute arbitrary commands.
Define: Heartbleed
A: A serious vulnerability in the OpenSSL cryptographic library that allowed attackers to read protected memory on affected servers.
Q: Acronym: UEFI
A: Unified Extensible Firmware Interface.
Q: Acronym: SMB
A: Server Message Block.
Q: Acronym: MMS
A: Multimedia Messaging Service.
Q: Acronym: OpenSSL
A: Open Secure Sockets Layer.
True or False:
The Stagefright vulnerability affected iOS devices.
A: False:
Stagefright affected Android devices by allowing code execution via specially crafted MMS messages.
True or False:
Heartbleed was a vulnerability in the OpenSSL library that compromised secret keys.
A: True:
Heartbleed allowed attackers to read sensitive memory contents, exposing secret keys.
True or False:
Firmware updates are unnecessary as firmware cannot be exploited.
A: False:
Firmware can contain vulnerabilities; updating it is crucial for security.
True or False:
macOS is completely safe from vulnerabilities due to its Unix-based architecture.
A: False:
macOS can have vulnerabilities, such as those exploited by the Shellshock bug.
Define: WannaCry Ransomware
A: A 2017 global ransomware attack that exploited the EternalBlue vulnerability to encrypt data and demand ransom payments.
Define: Stagefright Vulnerability
A: A critical flaw in the Android media playback engine that allowed remote code execution via MMS messages.
Define: Watering Hole Attack
A: A strategy where attackers compromise a website likely to be visited by their targets to distribute malware.
Define: Conficker Worm
A: A worm exploiting the MS08-067 vulnerability in Windows, leading to one of the largest infections in history.
Define: EternalBlue
A: An exploit developed by the NSA and leaked by the Shadow Brokers group, targeting vulnerabilities in Microsoft’s SMB protocol, notably used in the WannaCry attack.
Acronym:
Bash
A: Bourne Again Shell.
Define: Vulnerability Scanning
A: The process of automatically identifying vulnerabilities systems, such as
1. open ports
2. insecure configurations
3. missing patches.
Define: Threat Feed
A: A continuously updated source of information about potential cyber threats and vulnerabilities, providing actionable intelligence for vulnerability management.
Define: Penetration Testing
A: A proactive method where ethical hackers simulate real-world attacks to exploit vulnerabilities and evaluate an organization’s security posture.
Define: Bug Bounty Programs
A: Initiatives that incentivize external security researchers to discover and responsibly report vulnerabilities in exchange for rewards.
Define: Responsible Disclosure Programs
A: Guidelines established by organizations to encourage individuals to report vulnerabilities responsibly, allowing for fixes before exploitation.
Define: Security Audits
A: Comprehensive reviews of an organization’s security controls and practices, often aligned with standards like ISO 27001 or NIST.
Define: Cyber Threat Intelligence (CTI)
A: Data about threats and attackers gathered from various sources, used to improve an organization’s cybersecurity posture.
Acronym:
GDPR
A: General Data Protection Regulation.
Define: Deep Web
A: Parts of the internet not indexed by search engines, such as unlinked pages or those requiring registration.
Define: Dark Web
A: Hidden parts of the deep web accessible only through specific software like TOR, often associated with illicit activities but also used for privacy and research.