Unit 3 - Module 3 - Vulnerabilities Flashcards
What do you call a weakness that can be explioted by a threat?
Vulnerability
What do you call a way of taking advantage of a vulnerability?
Exploit
What would you call this list’s management protocol?
1) Idenfity vulnerabilites
2) Consider potential exploits
3) Prepare defenses against threats
4) Evaluate those defenses
Vulnerability Management
What do you call an exploit that was previously unknown?
Zero-day
What do you call a layered approach to vulnerability management that reduces risk?
Defense in depth
What are the 5 defense layers?
1) Perimeter Layer
2) Network Layer
3) Endpoint Layer
4) Application Layer
5) Data Layer
What do you call a mistake that can be exploited by a threat?
Exposure
What is the openly accessible dictionary of known vulnerabilities and exposures?
Common Vulnerabilities and Exposures list ( CVE list )
Who is a collection of non-profit research and development centers?
MITRE
What do you call the organization that volunteers to analyze and distribute information on eligible CVEs?
CVE Numbering Authority ( CNA )
What is this list criteria?
1) Independent of other issues
2) Reconized as a potential security risk
3) Submitted with supporting evidence
4) Only affect one codebase
Criteria for CVE list
( Submitting vulnerabilitys for the public to know )
What do you call the measurement system that scores the severity of a vulnerability?
Common Vulnerability Scoring System (CVSS)
What is a nonprofit open platform foundation that works to improve the security of software?
OWASP
What foundation has these 10 common vulnerabilities listed for businesses to be aware of?
1) Broken Access Control
2) Cryptographic Failures
3) Injection
4) Insecure design
5) Security Misconfiguration
6) Vulnerable and outdated components
7) Identification and authentication failures
8) Software and data integrity failures
9) Security logging and monitoring failures
10) Server-side request forgery
OWASP
What do you call the internal review process of an organization’s security systems?
Vulnerability Assessment
What assessment process is this?
1) Identification
2) Vulnerability Analysis
3) Risk Assesssment
4) Remediation
Vulnerability Assessment Process
What do you call a software that automatically compares known vulnerabilites and exposures against the technologies on the network?
Vulnerability Scanner
What layer is made up of technologies like network firewalls and others?
Network Layer
What layer authenticates systems that validates users access?
Perimeter Layer
What layer describes devices on a network, like laptops, desktops, or servers?
Endpoint Layer
What layer involves the software that users interact with?
Application Layer
What layer includes any information that’s stored, in transit, or in use?
Data Layer
What do you call a software and operating system update tha taddresses security vulnerabilities witin a program or product?
Patch Update
What is the advantage and disadvantage of manual updates?
Advantage - Being able to control, it’s useful when updates are not throughly testsed by developers.
Disadvantage - Critical updates can be forgotten or disregarded.
What penetration testing is when the tester has the same priviledged access that an internal developer would have?
Open-box testing
What penetration testing is when the tester has little to no access to internal systems?
Closed-box testing
What penetration testing is when the tester has limited access and knowledge of an internal system?
IE) Customer service rep has limited knowledge
Partial knowledge testing
What do you call the process of strengthening a system to reduce its vulnerabilities and attack surface?
Security Hardening
What do you call the internal review process of an organization’s security systems?
Vulnerability Assessments
What do you call external security vendors and freelance hackers that some companies incentivize to find and report vulnerabilities?
Bug Bounty
What do you call a person who might use their skills to achieve a political goal?
They’re an activist
Hacktivist
What do you call a threat actor that maintains unauthorized access to a system for an extended period of time?
Advanced Persistent Threat (APT)
What are 7 ways a threat actors gain access?
1) Direct Access - Referring to instances when they have physical access to a system
2) Removeable media - Portable hardware, like USB flash drives
3) Social Media plateforms - Used for communication and content sharing
4) Email - Both personal and business accounts
5) Wireless Networks - on permises
6) Cloud Services - Usually provided by third-party organizations
7) Supply Chains - Third party vendors that can persent a backdoor into systems
What do you call the pathways attackers use to penetrate security defences?
Attack Vectors