Types Of Vulnerabilities Flashcards

1
Q

Jailbreaking

A

Mobile vulnerability, is the bypassing the security restrictions on mobile device in order to gain greater control and access to the device operating system and files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Side channel

A

Weakness in hardware, weakness in physical properties of a device such as power consumption or electromagnetic radiation that can be used to extract sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Memory leak

A

Memory vulnerability, is the failure of OS ar app to free up dynamically requested memory. It slowest response time or can cause denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Buffer overflow

A

Memory and processor vulnerability, is overrunning the memory allocated (buffer) for data input and writing the excess data into non-allocated system memory. The excess data can contain instructions that the processor will execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TOE - time of evaluation

A

Race condition timing component - is when the program relies on the time of events concurrently or in a specific order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Race condition

A

Timing vulnerability, this is a flow that produces an unexpected result when timing of actions impact other actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TOC time of check

A

Race condition component, is when a program checks when the state of resource changes between time of check and time of use often because of a concurrent thread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Escalation

A

System vulnerability which can cause access to protected area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Memory injection

A

System vulnerability which can execute control. Memory injection is inserting malicious code into memory of a running process. The excess data can contain informations, instructions for execution in the processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privileged escalation

A

Injection type, code vulnerability, is gaining elevated access to resources that are normally protected from an application or user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Insecure APi

A

Cloud vulnerability, API used to provide an access to and integrate cloud resources such as storage and processing. IT provide a conduit for malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Directory traversal

A

Code vulnerability, injection type when there is the ability to access files and directories outside of the intended directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Side loading

A

Mobile vulnerability, is the process of installing and running software on a mobile device from source other than an official apps store or marketplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Injection

A

Code vulnerability, is the insertion of code by exploiting input validation or processing mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly