System Vulnerabilities

Cards (10)

  • System vulnerabilities
    Weaknesses in the design, implementation, or configuration of computer systems that can be exploited by attackers
  • Attack vector
    A path which a hacker/attacker can gain access to a computer or network to deliver a payload or exploit.
  • Types of vulnerabilities
    • Software
    • Hardware
    • Network
    • Social engineering
  • Software vulnerabilities
    • Weaknesses in computer software that can be exploited to gain unauthorised access to the system, steal data, alter information, or disrupt normal system operations
    • Can be caused by coding errors, security flaws, or system misconfigurations
  • Hardware vulnerabilities
    • Weaknesses in a computer's hardware components that can be exploited to gain unauthorised access to the system and steal or harm data
    • Can be caused by physical design flaws, manufacturing defects, or system misconfigurations
  • Network vulnerabilities
    • Weaknesses in a system's networking components that can be exploited to gain unauthorized access to the system, steal or alter data
    • Can be caused by insecure protocols and improper configuration settings
  • Social engineering vulnerabilities
    • Weaknesses in a system's users that can be exploited to gain unauthorised access to the system
    • Can be caused by gullible users, lack of awareness, or unenforced security policies
  • Exploitation techniques
    • Buffer overflows
    • Malware
    • Privilege escalation
    • Social engineering attacks
  • Vulnerability scanning
    The process of scanning a system for known vulnerabilities, usually with software such as Malware Bytes, Sophos Anti-Virus or Windows Security
  • What is Buffer Overflow?
    Simply where data overflows into programs where it does not belong and rewrites the original data due to memory capacity.