0% found this document useful (0 votes)
4 views

5 Cyber Security Vulnerability

The document outlines 5 common cyber security vulnerabilities: 1) Injection vulnerabilities which allow malicious code to be sent through an application to another system, like SQL injection. 2) Buffer overflows which exploit vulnerabilities where external data controls behavior. 3) Sensitive data exposure when personal or financial information is accessed without authorization. 4) Broken authentication and session management allows theft of login data or forged sessions. 5) Security misconfigurations occur when security settings are not properly implemented, like outdated anti-malware tools.

Uploaded by

Shaik Asif
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

5 Cyber Security Vulnerability

The document outlines 5 common cyber security vulnerabilities: 1) Injection vulnerabilities which allow malicious code to be sent through an application to another system, like SQL injection. 2) Buffer overflows which exploit vulnerabilities where external data controls behavior. 3) Sensitive data exposure when personal or financial information is accessed without authorization. 4) Broken authentication and session management allows theft of login data or forged sessions. 5) Security misconfigurations occur when security settings are not properly implemented, like outdated anti-malware tools.

Uploaded by

Shaik Asif
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

FIVE CYBER SECURITY VULNERABILITY: -

1. Injec on vulnerabili es
2. Buffer Overflows
3. Sensi ve Data Exposure
4. Broken Authen ca on & Session Management
5. Security Misconfigura on

 Injec on Vulnerabili es:


 An injection flaw is a vulnerability which allows an attacker to relay malicious code
through an application to another system.
 example is SQL injection, where an attacker sends “101 OR 1=1” for cracking the
credentials of the victim.

 Buffer Overflows:
 A buffer overflow attack is a common cyberattack that deliberately exploits a buffer
overflow vulnerability where user-controlled data is written to memory.
 Buffer overflow vulnerabilities typically occur in code that: Relies on external data to
control its behavior.
 User loses control over his data.

Memory Out of bound error


 Sensi ve data exposure:
 Sensitive data can include anything from personally identifiable information (PII),
such as Social Security numbers, to banking information, to login credentials.
 When this data is accessed by an attacker as a result of a data breach, users are at
risk for sensitive data exposure.

Stelling of sensi ve data leads to black mailing


 Broken Authen ca on & Session Management:
 broken authentication and session management allows a cybercriminal to steal a
user's login data, or forge session data, such as cookies, to gain access to websites.
 when attackers are able to compromise passwords, keys or session tokens, user
account information, and other details to assume user identities.
 Broken authentication act as open gate for the attackers.
 Security Misconfigura on:
 A security misconfiguration arises when essential security settings are either not
implemented or implemented with errors.
 Security tool misconfigurations could occur if a user does not install the latest
signature files of an anti-malware tool,

Security fault

You might also like