Vulnerabilities and Attacks Flashcards
Firmware
Specialized forms of software stored on hardware devices, like a router or smart thermostat, provide low-level control for the device’s specific hardware.
End-of-life Systems
Refer to hardware or software products that have ended their life cycle.
Patch Management Process
Regularly monitoring for updates
Assessing the relevance and impact of patches
Deploying patches in a timely manner
Hardening
Involves Tightening the security of a system
Patching
Involves the regular updating of the software, firmware, and applications with the latest security patches
Configuration Enforcement
Used to ensure that all devices and systems adhere to a standard secure configuration
Decommissioning
This means that the system is retired and removed from the network.
Isolation
Used to limit the potential damage that might occur from a potential security breach.
Segmentation
Used to divide the network into segments
Bluetooth Vulnerabilities
Insecure Device Paring - This occurs when Bluetooth devices establish a connection without proper authentication.
Device Spoofing - This occurs when an attacker impersonates a device to trick a user into connecting.
On-Path Attack - Exploits Bluetooth protocol vulnerabilities to intercept and alter communications between devices without either party being aware.
Bluetooth Attacks
Bluejacking
Bluesnarfing
Bluebugging
Bluesmack
Blueborne
Sideloading
Mobile Vulnerabilities and Attacks
The practice of installing applications on a device from unofficial sources which actually bypasses the device’s default app store.
Jailbreaking and Rooting
Mobile Vulnerabilities and Attacks
Process that gives users escalated privileges on the devices and allows users to circumvent the built-in security measures provided by the devices.
Mobile Device Management (MDM) Solution
Used to conduct patching of the devices by pushing any necessary updates to the devices to ensure that hey are always equipped with the latest security patches.
Used to disable a device’s ability to sideload programs, Detect if a device has been jailbroken or rooted, and forces each device to use a VPN connection.
What are the 4 primary SQL commands?
SELECT - Read from DB
INSERT - Write to DB
DELETE - Remove from DB
UPDATE - Overwrite Data on DB