Section 18.166 Vulnerabilities and Attacks Flashcards

Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources

1
Q

Vulnerabilities

A

Weaknesses or flaws in hardware, software, configurations, or processes within a computer system, network or application

Consequences:
● Unauthorised Access
● Data Breaches
● System Disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attacks

A

Deliberate actions by threat actors to exploit vulnerabilities

Lots of different forms like..
● Unauthorised Access
● Data Theft
● Malware Infections
● DoS Attacks
● Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly