Vulnerabilities and Attacks Flashcards

(49 cards)

1
Q

Security flaws or weakness inherent in a device’s physical components or design that that can be exploited to compromise the integrity, confidentiality, or availability of the system and its data.

A

Hardware Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Specialized form of software stored on hardware devices, like a router or a smart thermstat, that provides low-level control for the device’s specific hardware.

A

Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refers to hardware or software products that have reached the end of their life cycle.

A

End-of-Life Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Outdated computing software, hardware, or technologies that have been largely superseded by newer and more efficient alternative

A

Lagacy Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardware or software products that no longer received official technical support, security updates, or patches from their respective vendors or developers.

A

Unsupported Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Device, application, or piece of software that has not been updated with the latest security patches so that it remains vulnerable to known exploits and attacks

A

Unpatched System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Occurs when a device’s setting, parameters, or options are not optimally set up, and this can cause vulnerabilities to exist, a decrease in performance, or unintended behavior of device or systems

A

Hardware Misconfiguration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Involved tightening the security of a system

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Involved the regular updating of the software, firmware, and applications with

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Used to ensure all devices and systems adhere to a standard secure configuration

A

Configuration Enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Means that the system is retired and removed from the network

A

Decommissioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used to limit the potential damage that might occur from a potential security breach

A

Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Used to divide the network into segments

A

Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless technology standard used for exchanging data between fixed and mobile devices over short distance without the need for an internet connection

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Occur when Bluetooth devices establish a connection without proper authentication

A

Insure Device Pairing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Occurs when an attacker impersonates a device to trick a user into connecting

A

Device Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The practice of installing application on a device from unofficial source which actually bypasses the device’s default app store

A

Sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Process that gives users escalated privileges on the devices and allows users to circumvent the built-in security measures provided by the devices

A

Jailbreaking/Rooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Used to conduct patching of the devices by pushing any necessary updates to the devices to ensure that they are always equipped with the latest security patches

A

MDM Solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Any vulnerability that’s discovered or exploited before the vendor can issue a patch for it

A

Zero-day Vulnerabilities

21
Q

Any unknown exploit in the wild that exposes a previously unknown vulnerability in the software or hardware.

A

Zero-day Exploit

22
Q

OS that have not been updated with the latest security patches or fixes

A

Unpatched Systems (Unpatched)

23
Q

Occurs when the system’s settings are not properly configured, and this leaves the system vulnerable to exploitation

A

Misconfiguration

24
Q

Unauthorized data transfers from within an organization to an external location

A

Data Exfiltration

25
Occurs when an attacker has been able to craft a malicious update to a well-known and trusted program in order to compromise the systems of the program's end users.
Malicious Updates
26
The insertion of additional information or code through a data input form from a client to an application
Code Injection
27
Used by applications for authentication, authentication, and other types of data exchange
XML
28
XML encodes entities that expand to exponential sizes, consuming memory on the host and potentially crashing it.
XML Bomb (Billion Laughs Attack)
29
An attack that embeds a requestfor a local resource
XML External Entity ( XXE )
30
Occurs when data exceeds allocated memory, potentially enabling unauthorized access or code execution
Buffer Overflow
31
A temporary storage area where a program stores its data
Buffer
32
A security measure that randomizes memory addresses, making buffer overflow attacks harder for attackers
Address Space Layout Randomization ( ASLR )
33
Software vulnerabilities where the outcome depends on the timing of events, not matching the developer's intended order
Race Condition
34
A fundamental operation in programming, and the vulnerabilities arise from unsafe or concurrent usage, particularly in scenarios involving race conditions
Deferencing
35
Popular 2016 exploit, showcasing a race condition exploitation
Dirty Cow
36
Type of race condition where an attacker can alter a system resource after an application checks its state but before the operation is performed
Time - of - Check ( TOC)
37
Type of race condition that occurs when an attacker can change the state of a system resource between the time it is checked and the time it is used
Time - of - Use ( TOU )
38
Type of race condition that involves the manipulation of data or resources during the time window when a system is making a decision or Eval
Time of - Evaluation ( TOE )
39
Mutually exclusive flags that act as a gatekeeper to a selection of code, so that only one threat can be processed at a time
Mutex
40
Occurs when two or more processes are unable to proceed because each is waiting for the other to release a resource
Deadlock
41
Injects a malicious script into a trusted site to compromise the site's visitors
Cross-Site-Scripting ( XSS)
42
This type of attack only occurs when it's launched and happens once
Non-persistent XSS
43
Exploits the client's web browser using client-site scripts to modify the content and layout of the web page
Document Object Model (DOM) XSS
44
Enables web applications to uniquely identify a user across several different action and requests
Session Management
45
Known as a session cookie, which resides in memory and is used for a very short period of time
Non-persistent cookies
46
Stored in the browser cache unit either deleted by a user or expired
Persistent Cookie
47
Type of spoofing attacker where the attacker disconnects a host and then replaces it with his or her own machine by spoofing the original host IP
Session Hijacking
48
Type of spoofing attack where the attacker attempts to predict the session token in order to hijack the session
Session Prediction
49
Malicious script is used to exploit a session started on another site within the same web browser
Cross-Site Request Forgery