Virtualization & Cloud-specific Vulnerabilities Flashcards

(10 cards)

1
Q

Virtualization Security

A

Virtualization security → security practices specific to virtual environments where multiple virtual machines share the same physical hardware, requiring isolation controls, hardened hypervisors, and strict access management that differ from traditional systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtualization Vulnerabilities

A

Virtualization vulnerabilities → weaknesses in virtual environments such as local privilege escalation, command injection, or information disclosure that can impact multiple virtual machines if the hypervisor or host is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VM Escape Protection

A

Virtual machine escape protection → security controls designed to prevent an attacker from breaking out of a virtual machine and accessing the underlying hypervisor or other virtual machines on the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Resource Reuse

A

Resource reuse → virtualization risk where shared resources such as memory, storage, or processors are reassigned between virtual machines, potentially exposing residual data if not properly cleared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security in the Cloud

A

Security in the cloud → shared responsibility model where the cloud provider secures the underlying infrastructure while customers are responsible for securing their data, configurations, identities, and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DoS Cloud Attack

A

Denial of service cloud attack → attack that overwhelms cloud services with traffic or requests, consuming resources and making applications unavailable to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication Bypass Cloud Attack

A

Authentication bypass cloud attack → attack that exploits misconfigurations or vulnerabilities to gain access to cloud resources without proper identity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Directory Traversal Cloud Attack

A

Directory traversal cloud attack → attack that exploits faulty cloud configurations to access unauthorized directories or files, potentially exposing sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Remote Code Execution Cloud Attack

A

Remote code execution cloud attack → vulnerability that allows attackers to execute arbitrary code on cloud-based systems, often leading to full system compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Out of Bounds Write Cloud Attack

A

Out of bounds write cloud attack → vulnerability where a program writes data outside allocated memory boundaries in cloud workloads, potentially leading to crashes, data corruption, or code execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly