Security Vulnerabilities and Risk Management Flashcards
What is an asset?
An item perceived as having value to an organization. Assets can be digital (like SSNs, bank account numbers) or physical (like payment kiosks, servers, office spaces).
What is a threat?
Any circumstance or event that can negatively impact assets.
What is a risk?
Anything that can impact the confidentiality, integrity, or availability of an asset. Risk equals the likelihood of a threat.
What is a vulnerability?
A weakness that can be exploited by a threat.
What is an insider threat?
Staff members or vendors who abuse their authorized access to obtain data that may harm an organization.
What are advanced persistent threats (APTs)?
When a threat actor maintains unauthorized access to a system for an extended period of time.
What is an external risk?
Anything outside the organization that has the potential to harm organizational assets.
What is an internal risk?
A current or former employee, vendor, or trusted partner who poses a security risk.
What is multiparty risk?
Risk from outsourcing work to third-party vendors who may have access to intellectual property.
What are legacy system risks?
Risks from old systems that might not be accounted for or updated but can still impact assets.
What are the four common strategies for managing risks?
- Acceptance: Accepting a risk to avoid disrupting business continuity
- Avoidance: Creating a plan to avoid the risk altogether
- Transference: Transferring risk to a third party to manage
- Mitigation: Lessening the impact of a known risk
What is ProxyLogon?
A pre-authenticated vulnerability that affects the Microsoft Exchange server, allowing threat actors to complete user authentication to deploy malicious code remotely.
What is ZeroLogon?
A vulnerability in Microsoft’s Netlogon authentication protocol that affects user identity verification before allowing access to a website’s location.
What is Log4Shell?
A vulnerability that allows attackers to run Java code on someone else’s computer or leak sensitive information by enabling remote control of internet-connected devices.
What is PetitPotam?
A vulnerability affecting Windows NTLM that allows a LAN-based attacker to initiate an authentication request.