system vulnerabilities Flashcards
1
Q
network vulnerabilities
A
- firewall ports ( can be used as a way of spreading malware. could be exploited to gain access to data on system)
use firewalls to block unused ports - external storage devices ( e.g. USB. could bring malicious software into organisation unknowingly)
set rule of no external devices
2
Q
organisational vulnerabilities
A
- file permissions and privileges (assign staff access levels. total permissions is a risk. could cause damage. someone else could log into their account and have total permissions)
only assign permissions to staff that they require to perform their role. - password policy ( rules to ensure passwords are secure)
upper&lower case, nums, special char
3
Q
software vulnerabilties
A
- software from untrustworthy sources (could download malware)
- illegal copies of software ( can infect computers
- SQL ( on legitimate software, user enters SQL statement, runs against database. can delete/ extract data from database)
- zero day ( flaws in software that developers don’t know about- unpatched)
4
Q
OS vulnerabilities
A
- these are caused by poor maintenance
- using older OS. not longer supported by developer, not being updated
5
Q
A