Module 1 part-3
Understand Different Types of Vulnerabilities
Multi-column
Vulnerability Classification
- 1 Misconfigurations/weak configurations
- 2 Default installations/default configurations
- 3 Application flaws
- 4 Poor patch management
- 5 Design flaws
- 6 Operating system flaws
- 7 Default passwords
- 8 Zero-day vulnerabilities
- 9 Legacy platform vulnerabilities
- 10 System sprawl/undocumented assets
- 11 Improper certificate and key management
- 12 Third-party risks
Misconfigurations(1)
Network Misconfigurations
- Insecure Protocols
- Open Ports and Services
- Errors
- Weak Encryption
Host Misconfigurations
- Open Permissions
- Unsecured Root Accounts
Application Flaws(3)
- Application flaws are vulnerabilities in appl ications t hat are exploited by the attackers
- Flawed applications pose security threats such as data tampering and unauthorized access to configuration stores
Default Installations/Default Configurations (2)
- Default installations are usually user-friendly - especially when the device is being used for the first time when the primary concern is the usability of the device rather than the device's security
- Failing to change the default settings while deploying the software or hardware allows the attacker to guess the settings to break into the system
- When connecting a system or device to a network, it is important to disable unnecessary components and services associated wit h the default configuration
စာမျက်နှာ 137 Page 123
Multi-column
Poor Patch Management(4)
- A patch is a small piece of software designed to fix problems, security vulnerabilities, and bugs as well as improve the usability or performance of a computer program or its supporting data
- Software vendors provide patches that prevent exploitations and reduce the probability of threats exploiting a specific vulnerability
- Unpatched software can make an application, server, or device vulnerable to various attacks
ဥပမာ
- Unpatched Servers
- Unpatched Firmware
- Un patched OS
- Unpatched Applications
Design Flaws(5)
- Design vulnerabilities such as incorrect encryption or the poor validation of data refer to logical flaws in the functionality of the system that attackers exploit to bypass the detection mechanism and acquire access to a secure system
Operating System. Flaws(6)
စာမျက်နှာ 144 Page 130
Multi-column
Default Passwords(7)
- Manufacturers provide users with default passwords to access the device during its initial set-up, which users must change for future use
- When users forget to update the passwords and continue using the default passwords, they make devices and systems vulnerable to various attacks such as brute force and dictionary attacks
Zero-Day Vulnerabilities (8)
- known vulnerabilities in software/hardware that are exposed but not yet patched
- These vulnerabilities are exploited by the attackers before being acknowledged and patched by the software developers or security analysts
Legacy Platform Vulnerabilities(9)
စာမျက်နှာ 148 Page 134
Multi-column
System Sprawl/Undocumented Assets(10)
- The system sprawl vulnerability arises within an organizational network because of an increased number of system or server connections without proper documentation or an understanding of their maintenance
- These assets are often neglected over t ime, making t hem susceptible to attacks
Improper Certificate and key Management (11)
- Improper certificate and key management may lead to many vulnerabilities that allow attackers to perform password cracking and data exfiltration attacks
- Storing or retaining legacy or outdated keys also poses major threats to organizations
- Private keys used with certificates must be stored in a highly secured environment; otherwise, an unauthorized individual can intercept the keys and gain access to confidential data or critical systems
Third-party Risks (12)
Examples of Third-party Rislts
- Vendor Management
- Supply-chain Risks
- Outsourced Code Development
- Data Storage
- Cloud-based vs On-premises Risks
စာမျက်နှာ 154 Page 140
module1 ဒီမှာပြီးပြီ