1_6_1 Section 1 – Attacks, Threats, and Vulnerabilities - 1.6 – Vulnerabilities - Vulnerability Types
42 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the goal of security researchers?

  • To use vulnerabilities to attack networks
  • To sell vulnerabilities to the highest bidder
  • To find vulnerabilities before attackers do (correct)
  • To ignore vulnerabilities in software
  • What is a characteristic of a zero-day attack?

  • It is a type of attack that can be easily mitigated
  • It is a type of attack that uses a previously unknown vulnerability (correct)
  • It is a well-known type of attack
  • It is a type of attack that has been seen before
  • Why is it difficult to mitigate a zero-day attack?

  • Because it is a well-known type of attack
  • Because it is very difficult to stop something that you had no idea existed (correct)
  • Because it is a type of attack that has been seen before
  • Because it is a type of attack that can be easily detected
  • What is the motivation of attackers to find vulnerabilities?

    <p>To use them to attack networks or sell them to the highest bidder</p> Signup and view all the answers

    What is hidden in the code of many applications?

    <p>A potential way for an attacker to get into your network</p> Signup and view all the answers

    What is the goal of attackers when it comes to finding vulnerabilities?

    <p>To find them before security researchers do</p> Signup and view all the answers

    What is the primary purpose of the CVE database?

    <p>To identify and document vulnerabilities</p> Signup and view all the answers

    What is the result of leaving data open on the internet without security?

    <p>It makes it easy for anyone on the internet to access the data</p> Signup and view all the answers

    What was the outcome of Verizon's misconfigured Amazon S3 data repository in 2017?

    <p>A researcher found the data and closed the hole before it was exploited</p> Signup and view all the answers

    What can happen if an attacker gains access to an administrator or root account?

    <p>They will have full control over the operating system</p> Signup and view all the answers

    Why should access to root or administrative accounts be closely monitored?

    <p>Because an attacker may have full control over the operating system</p> Signup and view all the answers

    What can be a problem with error messages in applications?

    <p>They may show sensitive information that can be used against us</p> Signup and view all the answers

    What was the outcome of the Patreon website error in 2015?

    <p>Attackers were able to access the debugger and transfer customer data</p> Signup and view all the answers

    Why is it important to encrypt data?

    <p>To protect the data from being accessed or transferred</p> Signup and view all the answers

    What is a common problem with cloud repositories?

    <p>They are often misconfigured and left open</p> Signup and view all the answers

    Why should policies and procedures be in place for administrative accounts?

    <p>To prevent casual use of these accounts</p> Signup and view all the answers

    What is the importance of using strong encryption protocols?

    <p>To ensure that data is well protected</p> Signup and view all the answers

    What is the common purpose of AES and triple DES?

    <p>To encrypt data</p> Signup and view all the answers

    What is the purpose of using hashes in encryption?

    <p>To verify data integrity</p> Signup and view all the answers

    What is the purpose of using TLS protocol?

    <p>To encrypt data during transport</p> Signup and view all the answers

    What is the problem with using encryption keys of 128 bits or smaller?

    <p>They are not secure enough</p> Signup and view all the answers

    What is the purpose of capturing packets and analyzing them?

    <p>To determine if data is being sent in the clear</p> Signup and view all the answers

    What is the consequence of not configuring applications to use secure protocols?

    <p>Data will be sent in the clear</p> Signup and view all the answers

    What is the purpose of the Wall of Sheep at Defcon?

    <p>To display a list of applications that are sending data in the clear</p> Signup and view all the answers

    What is the problem with default usernames and passwords on IoT devices?

    <p>They are not secure enough</p> Signup and view all the answers

    What is the purpose of the Mirai botnet?

    <p>To take control of IoT devices</p> Signup and view all the answers

    What is the primary concern with legacy systems?

    <p>They are running software that has reached end of life.</p> Signup and view all the answers

    Why might a security administrator decide to keep legacy equipment on the network?

    <p>Because it is still necessary for a particular function.</p> Signup and view all the answers

    What is one way to protect a legacy system that cannot be patched?

    <p>Add a firewall around the system.</p> Signup and view all the answers

    What happens when software reaches end of life?

    <p>It is no longer supported by the vendor.</p> Signup and view all the answers

    Why is it important to assess the advantages and disadvantages of keeping a legacy system on the network?

    <p>To determine the security risks and benefits of keeping the system.</p> Signup and view all the answers

    What is the goal of adding security tools around a legacy system?

    <p>To keep the system as secure as possible.</p> Signup and view all the answers

    Why do attackers modify software to control more IoT devices?

    <p>To gain unauthorized access to the devices</p> Signup and view all the answers

    What is the purpose of opening ports on a server?

    <p>To allow communication between the server and applications</p> Signup and view all the answers

    What is the main function of a firewall?

    <p>To control and manage traffic to the network</p> Signup and view all the answers

    What is the purpose of auditing a firewall's rule base?

    <p>To ensure that all rules are up to date and correct</p> Signup and view all the answers

    What is the main reason organizations release software updates?

    <p>To fix security vulnerabilities in the software</p> Signup and view all the answers

    What type of systems are referred to as legacy systems?

    <p>Older systems that may be running outdated operating systems</p> Signup and view all the answers

    What was the consequence of Equifax not patching their systems in 2017?

    <p>They suffered a massive data breach, resulting in fines and reputational damage</p> Signup and view all the answers

    What is the role of a group of people who test patches in an organization?

    <p>To test patches to ensure they operate properly in the environment</p> Signup and view all the answers

    What is the purpose of patching a system?

    <p>To fix security vulnerabilities and keep the system up to date</p> Signup and view all the answers

    What can happen if patches are not kept up to date?

    <p>The system may be vulnerable to attacks and breaches</p> Signup and view all the answers

    Study Notes

    Common Vulnerabilities and Exposures (CVE)

    • CVE is a database of common vulnerabilities and exposures, located at cve.mitre.org.
    • It serves as a resource to stay up-to-date on the latest vulnerabilities.

    Open Permissions Problem

    • An open permissions problem occurs when information is put on the internet without applying security, allowing anyone to access it.
    • This is becoming more common as data is increasingly stored in the cloud.
    • Example: Verizon's 2017 exposure of 14 million records due to misconfigured Amazon S3 data repository.

    Administrator Accounts

    • Leaving administrator accounts open can allow attackers to gain full control over an operating system.
    • Proper security and policies should be in place to prevent casual use of administrator accounts.

    Error Messages

    • Error messages can reveal sensitive information, such as service and application details, version information, and debug information.
    • Example: Patreon's 2015 error message vulnerability allowed attackers to execute code on their web server.

    Encryption

    • Encrypting data is essential, but it's not enough; encryption protocols and keys must be strong and up-to-date.
    • Examples of strong encryption protocols include AES and triple DES.
    • Wireless encryption protocols should also be kept up-to-date.

    Legacy Systems

    • Legacy systems, including devices with default usernames and passwords, can be vulnerable to attacks like the Mirai botnet.
    • These systems may be running outdated software with known vulnerabilities.
    • A security administrator must weigh the advantages and disadvantages of keeping these systems on the network.

    Vulnerabilities and Zero-Day Attacks

    • There are hidden vulnerabilities in software that attackers or security researchers can discover and exploit.
    • A zero-day attack occurs when an unknown vulnerability is exploited, and it's difficult to mitigate.

    Firewalls and Network Security

    • Firewalls are used to manage traffic flow and keep bad actors out, but rule sets can become complex and unwieldy.
    • Regular audits are necessary to ensure the rule base is up-to-date and correct.

    Patching and Updates

    • Patches are released to address security vulnerabilities, and organizations should prioritize keeping systems up-to-date.
    • Example: Equifax's 2017 data breach due to an unpatched Apache Struts vulnerability.

    Legacy Devices and IoT

    • Legacy devices and IoT devices can be vulnerable to attacks if not properly secured.
    • A transition plan is necessary to remove legacy software and replace it with more secure alternatives.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Learn about the different types of vulnerabilities that can be exploited by attackers to gain access to your network. This quiz covers common weakness in computer applications and how security researchers work to identify and fix them.

    More Like This

    Use Quizgecko on...
    Browser
    Browser