2.3 Secure Software Updates Flashcards

(32 cards)

1
Q

Why is it important to keep operating systems and applications updated?

A

To avoid vulnerabilities and security problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What risks are associated with not updating software?

A

Older code can lead to security exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What inherent risk arises when installing a software update?

A

Updates may contain malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should backups help with before making system changes?

A

Reverting to a previous configuration if something goes wrong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What constitutes a ‘trusted source’ for software updates?

A

Sources commonly used or associated with the update process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can users verify the legitimacy of an update message?

A

Differentiate between a legitimate in-browser update prompt and a suspicious one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the most reliable way to download updates?

A

Directly from the application developer’s site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a digital signature in the context of software updates?

A

A cryptographic mechanism used to verify authenticity and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do digital signatures enhance trust in an update?

A

Verification by the operating system and confirmation of developer identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What role does the operating system play in validating digital signatures?

A

It verifies that the signature is legitimate and has not been tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do built-in update processes in applications generally function?

A

They automatically download and install updates from the developer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What security checks are typically integrated into in-app update processes?

A

Automatic verification and digital signature checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do in-app updates generally have a high amount of trust?

A

They involve automatic verification and are sourced directly from the manufacturer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a key limitation of in-app update processes?

A

They can still be vulnerable to compromised internal systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How did the SolarWinds Orion attack bypass traditional security measures?

A

Attackers injected malicious code into legitimate, digitally signed updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What was the impact of the SolarWinds breach?

A

Access to governmental agencies and large companies.

17
Q

What does the SolarWinds incident demonstrate about software update security?

A

Attackers can exploit trusted update processes.

18
Q

How do the concepts of ‘trust’ and ‘verification’ apply to software updates?

19
Q

What are the trade-offs between immediate updating and exercising caution?

20
Q

How can users balance the need for security with the risk of malicious updates?

21
Q

What is a vulnerability?

A

A weakness or flaw in a system or software that can be exploited by an attacker.

22
Q

What is a patch?

A

A small piece of software designed to fix a bug or security vulnerability.

23
Q

What is malicious software (malware)?

A

Software intentionally designed to cause damage or steal data.

24
Q

What is a backup?

A

A copy of data or system configuration created to restore the original.

25
What is a digital signature?
A mechanism to verify the authenticity and integrity of digital messages or software.
26
What is an operating system (OS)?
Software that supports a computer's basic functions.
27
What is an in-app update process?
A feature that allows applications to download and install updates automatically.
28
What is a supply chain attack?
A cyberattack targeting less secure elements in a supply network.
29
What is SolarWinds Orion?
An IT management software product exploited in a major supply chain attack.
30
Fill in the blank: A software update is similar to installing a _______.
new application.
31
True or False: Built-in update processes typically lack security checks.
False.
32
What is the main takeaway from the SolarWinds incident?
Trusted update processes can be compromised.