Physical and software security controls Flashcards
What is a “zero-day” attack? Why is it so effective for hackers?
Zero-day attacks leave no time (zero days) to respond to the threat. There
has been no preparation, as the threat or vulnerability was previously
unknown. These attacks include web application attacks, client-side attacks
and buffer overflow attacks.
What is the difference between a vulnerability and an exploit?
A vulnerability is a weakness in an application, an exploit is when an agent
makes use of that weakness to take advantage of an insecure situation.
Only certain users are permitted to view the information because they have…
Authorisation
Access to confidential and sensitive information is available only to those who have authorisation; anyone not authorised is denied access.
Implementation relies on usernames, passwords, access control lists and encryption.
Defence against attackers is increasingly difficult due to:
- complexity of attack tools.
- greater sophistication of attacks.
- delays in patching software products.
Threats are increasing due to availability of software tools, complexity and
improved planning of attacks and delays once vulnerabilities have been
identified.
The process that ensures an individual is who they claim to be is
known as…
Authentication
Typical processes to identify authorised personnel are: Security passes
to authorise access to secure areas; biometric authentication for
authorised personnel.