Module 1 part-3

Understand Different Types of Vulnerabilities

Multi-column

Vulnerability Classification

  • 1 Misconfigurations/weak configurations
  • 2 Default installations/default configurations
  • 3 Application flaws
  • 4 Poor patch management
  • 5 Design flaws
  • 6 Operating system flaws
  • 7 Default passwords
  • 8 Zero-day vulnerabilities
  • 9 Legacy platform vulnerabilities
  • 10 System sprawl/undocumented assets
  • 11 Improper certificate and key management
  • 12 Third-party risks

Misconfigurations(1)

Network Misconfigurations

  • Insecure Protocols
  • Open Ports and Services
  • Errors
  • Weak Encryption

Host Misconfigurations

  • Open Permissions
  • Unsecured Root Accounts

Application Flaws(3)

  • Application flaws are vulnerabilities in appl ications t hat are exploited by the attackers
  • Flawed applications pose security threats such as data tampering and unauthorized access to configuration stores

Default Installations/Default Configurations (2)

  • Default installations are usually user-friendly - especially when the device is being used for the first time when the primary concern is the usability of the device rather than the device's security
  • Failing to change the default settings while deploying the software or hardware allows the attacker to guess the settings to break into the system
  • When connecting a system or device to a network, it is important to disable unnecessary components and services associated wit h the default configuration

စာမျက်နှာ 137 Page 123


Multi-column

Poor Patch Management(4)

  • A patch is a small piece of software designed to fix problems, security vulnerabilities, and bugs as well as improve the usability or performance of a computer program or its supporting data
  • Software vendors provide patches that prevent exploitations and reduce the probability of threats exploiting a specific vulnerability
  • Unpatched software can make an application, server, or device vulnerable to various attacks
ဥပမာ
  • Unpatched Servers
  • Unpatched Firmware
  • Un patched OS
  • Unpatched Applications

Design Flaws(5)

  • Design vulnerabilities such as incorrect encryption or the poor validation of data refer to logical flaws in the functionality of the system that attackers exploit to bypass the detection mechanism and acquire access to a secure system

Operating System. Flaws(6)

စာမျက်နှာ 144 Page 130


Multi-column

Default Passwords(7)

  • Manufacturers provide users with default passwords to access the device during its initial set-up, which users must change for future use
  • When users forget to update the passwords and continue using the default passwords, they make devices and systems vulnerable to various attacks such as brute force and dictionary attacks

Zero-Day Vulnerabilities (8)

  • known vulnerabilities in software/hardware that are exposed but not yet patched
  • These vulnerabilities are exploited by the attackers before being acknowledged and patched by the software developers or security analysts

Legacy Platform Vulnerabilities(9)

စာမျက်နှာ 148 Page 134


Multi-column

System Sprawl/Undocumented Assets(10)

  • The system sprawl vulnerability arises within an organizational network because of an increased number of system or server connections without proper documentation or an understanding of their maintenance
  • These assets are often neglected over t ime, making t hem susceptible to attacks

Improper Certificate and key Management (11)

  • Improper certificate and key management may lead to many vulnerabilities that allow attackers to perform password cracking and data exfiltration attacks
  • Storing or retaining legacy or outdated keys also poses major threats to organizations
  • Private keys used with certificates must be stored in a highly secured environment; otherwise, an unauthorized individual can intercept the keys and gain access to confidential data or critical systems

Third-party Risks (12)

Examples of Third-party Rislts
  • Vendor Management
  • Supply-chain Risks
  • Outsourced Code Development
  • Data Storage
  • Cloud-based vs On-premises Risks

စာမျက်နှာ 154 Page 140

module1 ဒီမှာပြီးပြီ