Section 18.171 Operating System Vulnerabilities Flashcards

Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.

1
Q

Operating Systems

A

Operating systems are essential in the functioning and protection of our digital services because they bridge the gap betrween hardware and software so seamless actions can occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Operating System Vulnerabilities

Unpatched Systems

A

Operating systems that have not been updated with the latest security patches or fixes

■ To mitigate unpatched system vulnerabilities, ensure regular system updates and patches, either automatically or manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operating System Vulnerabilities

Zero-Day Vulnerabilities

A

Unknown vulnerabilities to developers and attackers

■ Security solutions like host-based intrusion prevention systems (IPS) can help detect and block suspicious activities

■ Frequent system and software updates provide additional defense against potential zero-day exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Operating System Vulnerabilities

Misconfigurations

A

Occurs when system settings are improperly configured

■ Standardize and automate configuration processes with configuration management tools

■ Conduct periodic audits and reviews to identify and mitigate vulnerabilities due
to misconfigurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Operating System Vulnerabilities

Data Exfiltration

A

Involves unauthorized data transfers from an organization to an external location

■ Protect against data exfiltration with encryption for data at rest and endpoint protection tools

■ Endpoint protection tools can monitor and restrict unauthorized data transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operating System Vulnerabilities

Malicious Updates

A

Appear as legitimate security updates but contain malware or exploits

■ Source updates from trusted vendors and official channels

■ Maintain application allow lists, verify update authenticity with digital signatures and hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly