Vulnerablities of misconfiguration, mobile devices, and zero-day Flashcards
Open permissions is increasingly common w/-
Cloud storage
Insecure protocols that aren’t encrypted include:
Telnet, FTP, SMTP, IMAP
Use encrypted versions such as:
SSH, SFTP, IMAPS
Mirai botnet
Takes advantage of default configurations
Solutions to open ports:
Have it managed with a firewall, to manage traffic flows and allow or deny based on port # or app.
**Always test & audit
Jailbreaking
allow users to bypass the restrictions set by a device, specifically Apple.
Rooting
gaining admin access & bypassing restrictions, specifically Android.
Sideloading
Installation of an app on a mobile device without using the app store.
Zero-day exploit
cyberattack vector that takes advantage of an unknown or unaddressed security flaw in software, hardware.