Vulnerabilities Flashcards
A list of publicly disclosed computer security vulnerabilities and exposures database.
CVE - Common Vulnerabilities and Explosion
A vulnerability used against you that has never been seen up to this point. Meaning is brand new.
Zero-day Attack
When information has been put onto the internet but no security has been applied to that data, so an attacker just waited for you to leave the door open and walked into your system.
Open Permissions Problem
Type of encryption key management solution where only one key is used to both, encrypt and decrypt electronic data.
Symmetric Encryption
Type of encryption that is also known as public key encryption, and makes the HTTPS protocol possible. Two keys are used instead of one.
Asymmetric Encryption
Below how many bits, are encryption ciphers considered weak and low in protection?
128 bits
Group of protocols that are less protective and should not be use to transmit data.
FTP, SMTP, IMAP, HTTP, and Telnet
Malware that takes advantage of default usernames and passwords, and takes control of their system to make them part of a botnet group and eventually use it for DDoS attack. It is open souce so anyone can download it and modify it for their own purposes making it very dangerous.
Mirai Botnet
Network security software that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall
Term that refers to outdated or older computer systems.
Legacy
Scan designed to look at systems to see if potential vulnerabilities might exist in an operating system, network device or application. Tries to determine from the outside if there is a potential threat access.
Vulnerability Scan
Type of scan that looks into a device and tries to determined what ports happen to be responding to that IP Address.
Port Scan
When you scan as if you are someone who has no access to the network.
Non credentialed scan
When you run a scan as if you where an insider and have access to the network.
Credential scan
A vulnerability that is reported but doesn’t really exist.To avoid this, you should have your software scan tools updated to the latest version.
False Positive