Vulnerabilities Flashcards

1
Q

What are four example of Weak Configurations?

A

1) Default Configuration
2) Having weak or no encryption
3) Unsecure Protocols
4) Having open permissions
- Everyone permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of the risks associated with third parties?

A

1) Intellectual property theft
2) Identity/ credential theft
3) Network intrusion
4) Reputation damage
5) Vendor support
6) Data
- Storage
- Whose jurisdiction is the data in if it is in the
cloud
- Loss/ Leakage
- Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some possible issues with working with a third party vendor?

A

1) Vendor reputation
2) Lack of visibility
3) Compliance risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some possible benefits with working with a third party vendor?

A

1) Vendor screen
2) Documentation
- Transference of risk
3) Risk management
4) Compliance monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give examples of system integration with third parties.

A

1) Social media
- Facebook, Twitter, Instagram
2) Delivery system
- UPS, USPS, DHL, FEDEX
3) Payment systems
- Paypal, Apple Pay, Google Wallet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some common challenges with outsourced code when dealing with a third party?

A

1) Code quality/ protection
2) Compliance risk
3) Non-disclosure agreements
4) SDLC issues
-Software development lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some common vulnerabilities?

A

1) Patch management
- Firmware, OS, Application
2) Legacy systems
- Lack of vendor support
- Lack of patching
- Lack of security support
3) Zero-day
- Most vulnerable, no vendor awareness, and no
patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly