Unit 3 - Module 3 - Vulnerabilities Flashcards
What do you call a weakness that can be explioted by a threat?
Vulnerability
What do you call a way of taking advantage of a vulnerability?
Exploit
What would you call this list’s management protocol?
1) Idenfity vulnerabilites
2) Consider potential exploits
3) Prepare defenses against threats
4) Evaluate those defenses
Vulnerability Management
What do you call an exploit that was previously unknown?
Zero-day
What do you call a layered approach to vulnerability management that reduces risk?
Defense in depth
What are the 5 defense layers?
1) Perimeter Layer
2) Network Layer
3) Endpoint Layer
4) Application Layer
5) Data Layer
What do you call a mistake that can be exploited by a threat?
Exposure
What is the openly accessible dictionary of known vulnerabilities and exposures?
Common Vulnerabilities and Exposures list ( CVE list )
Who is a collection of non-profit research and development centers?
MITRE
What do you call the organization that volunteers to analyze and distribute information on eligible CVEs?
CVE Numbering Authority ( CNA )
What is this list criteria?
1) Independent of other issues
2) Reconized as a potential security risk
3) Submitted with supporting evidence
4) Only affect one codebase
Criteria for CVE list
( Submitting vulnerabilitys for the public to know )
What do you call the measurement system that scores the severity of a vulnerability?
Common Vulnerability Scoring System (CVSS)
What is a nonprofit open platform foundation that works to improve the security of software?
OWASP
What foundation has these 10 common vulnerabilities listed for businesses to be aware of?
1) Broken Access Control
2) Cryptographic Failures
3) Injection
4) Insecure design
5) Security Misconfiguration
6) Vulnerable and outdated components
7) Identification and authentication failures
8) Software and data integrity failures
9) Security logging and monitoring failures
10) Server-side request forgery
OWASP
What do you call the internal review process of an organization’s security systems?
Vulnerability Assessment