Vulnerability Types Flashcards
Zero day
An attack that occurs on a vulnerability after a software has been released
Default settings
Default settings can be researched and hacked.
Unsecured accounts
Accounts that are left unsecured become targets for attackers looking to execute attacks with elevated privileges
Open permissions
Accounts or programs not having properly restricted permissions (principal of least privilege)
Outdated protocols
Don’t use them if you don’t have to. WEP/ WPA
Unsecured protocols
Telnet smtp, pop3, LDAP and more are not secure.
Open ports
Unnecessary ports, protocols, and services running or open when not needed, increasing the attack surface
Third party risk
Anything (hardware, software, cloud service providers) you depend on someone else to provide falls into this category.
Shadow IT
Unauthorized software or hardware on the network or systems (end user actions)
Improper or weak patch management