Section 18.167 Hardware Vulnerabilities Flashcards

Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.

1
Q

Hardware Vulnerabilities

A

Security flaws or weaknesses in a device’s physical components or design that can be exploited to compromise system integrity, confidentiality, or availability of the system and its data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Hardware Vulnerabilities

Firmware Vulnerabilities

A

Specialised software stored on hardware devices like a router or a smart thermostat that provides low level control for the devices specific hardware

● Can grant attackers full control, leading to unauthorized access or takeover

● Vulnerabilities due to insecure development, outdated practices, and overlooked updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Hardware Vulnerabilities: End-of-Life, Legacy & Unsupported sys

End-of-Life Systems

A

No updates or support from the manufacturer

Vulnerable due to the lack of patching and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

End-of-Life, Legacy, and Unsupported Systems

Legacy

A

Outdated and superseded by newer alternatives

Vulnerable due to the lack of patching and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

End-of-Life, Legacy, and Unsupported Systems

Unsupported

A

No official support, security updates, or patches

Vulnerable due to the lack of patching and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of Hardware Vulnerabilities

Unpatched Systems

A

Device, application or piece of software that not been updated with the latest security patches so that it remians vulnerable to known exploits and attacks

● Risk from oversight, negligence, or challenges in updating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of Hardware Vulnerabilities

Hardware Misconfigurations

A

Occurs when a devices settings, parameters or options are not optimally set up. This can cause vulnerabilitites to exist, decrease in peformance or unintended behaviour of systems and devices

● Caused by oversight, lack of understanding, or deployment errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mitigation Strategies

Hardening

A

Tighten security by closing unnecessary ports, disabling services, and setting permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mitigation Strategies

Patching

A

Regular updates to fix known vulnerabilities in software, firmware, and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mitigation Strategies

Configuration Enforcement

A

Ensure devices adhere to secure configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mitigation Strategies

Decommissioning

A

Retire end-of-life or legacy systems posing security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mitigation Strategies

Isolation

A

Isolate vulnerable systems from the enterprise network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mitigation Strategies

Segmentation

A

Divide the network into segments to limit the impact of breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly