Section 18.171 Operating System Vulnerabilities Flashcards
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.
Operating Systems
Operating systems are essential in the functioning and protection of our digital services because they bridge the gap betrween hardware and software so seamless actions can occur
Operating System Vulnerabilities
Unpatched Systems
Operating systems that have not been updated with the latest security patches or fixes
■ To mitigate unpatched system vulnerabilities, ensure regular system updates and patches, either automatically or manually
Operating System Vulnerabilities
Zero-Day Vulnerabilities
Unknown vulnerabilities to developers and attackers
■ Security solutions like host-based intrusion prevention systems (IPS) can help detect and block suspicious activities
■ Frequent system and software updates provide additional defense against potential zero-day exploits
Operating System Vulnerabilities
Misconfigurations
Occurs when system settings are improperly configured
■ Standardize and automate configuration processes with configuration management tools
■ Conduct periodic audits and reviews to identify and mitigate vulnerabilities due
to misconfigurations
Operating System Vulnerabilities
Data Exfiltration
Involves unauthorized data transfers from an organization to an external location
■ Protect against data exfiltration with encryption for data at rest and endpoint protection tools
■ Endpoint protection tools can monitor and restrict unauthorized data transfers
Operating System Vulnerabilities
Malicious Updates
Appear as legitimate security updates but contain malware or exploits
■ Source updates from trusted vendors and official channels
■ Maintain application allow lists, verify update authenticity with digital signatures and hashes