What are Hardware Vulnerabilities?
Security flaws or weaknesses in a device’s physical components or design that can be exploited to compromise system integrity, confidentiality, or availability
What are Firmware Vulnerabilities?
Grants attackers full control of a device, leading to unauthorized access or takeover
What are End-of-life Systems
Software or hardware with very limited updates or support from the manufacturer, as it’s reaching the end of it’s life cycle soon
What are Legacy Systems?
Outdated software or hardware that’s still in use, but has been superseded by newer alternatives
What are Unsupported Systems?
Hardware or software that receive no official support, security updates, or patches from the vendor
What are Unpatched Systems?
Devices, applications, or software without the latest security patches
What are Hardware Misconfigurations?
Occurs when a device’s settings are incorrect or aren’t optimally set up
What is Hardening?
Tighten security by closing unnecessary ports, disabling services, and setting permissions
What is Patching?
Regular updates to fix known vulnerabilities in software, firmware, and applications with the latest security patches
What is Configuration Enforcement?
Ensures devices and systems adhere to a standard secure configuration
What is Decommissioning?
Retire end-of-life or legacy systems posing security risks
What is Isolation?
Isolate vulnerable systems from the enterprise network
What is Segmentation?
Divides the network into segments to limit the impact of breaches