Hardware Vulnerabilities Flashcards

(13 cards)

1
Q

What are Hardware Vulnerabilities?

A

Security flaws or weaknesses in a device’s physical components or design that can be exploited to compromise system integrity, confidentiality, or availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Firmware Vulnerabilities?

A

Grants attackers full control of a device, leading to unauthorized access or takeover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are End-of-life Systems

A

Software or hardware with very limited updates or support from the manufacturer, as it’s reaching the end of it’s life cycle soon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Legacy Systems?

A

Outdated software or hardware that’s still in use, but has been superseded by newer alternatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Unsupported Systems?

A

Hardware or software that receive no official support, security updates, or patches from the vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Unpatched Systems?

A

Devices, applications, or software without the latest security patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Hardware Misconfigurations?

A

Occurs when a device’s settings are incorrect or aren’t optimally set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Hardening?

A

Tighten security by closing unnecessary ports, disabling services, and setting permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Patching?

A

Regular updates to fix known vulnerabilities in software, firmware, and applications with the latest security patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Configuration Enforcement?

A

Ensures devices and systems adhere to a standard secure configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Decommissioning?

A

Retire end-of-life or legacy systems posing security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Isolation?

A

Isolate vulnerable systems from the enterprise network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Segmentation?

A

Divides the network into segments to limit the impact of breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly