Threat Table

advertisement
Vulnerabilities
This table lists vulnerabilities likely to affect a wide variety of organizations. The list is
not comprehensive and will not remain current. Therefore, it is important that you
remove vulnerabilities that are not relevant to your organization and add newly identified
ones to it during the risk assessment. It is provided as a reference list and a starting point
to help your organization get underway.
Vulnerability Class
Physical
Physical
Vulnerability
Natural
Example
Unlocked doors
Unguarded access to
computing facilities
Insufficient fire suppression
systems
Poorly designed buildings
Flammable materials used in
construction
Flammable materials used in
finishing
Unlocked windows
Walls susceptible to physical
assault
Interior walls do not
completely seal the room at
both the ceiling and floor
Facility located on a fault line
Natural
Facility located in a flood zone
Natural
Facility located in an
avalanche area
Physical
Physical
Physical
Physical
Physical
Physical
Physical
Hardware
Hardware
Hardware
Hardware
Hardware
Missing patches
Outdated firmware
Misconfigured systems
Systems not physically
secured
Management protocols
allowed over public interfaces
Software
Out-of-date software
Software
Software
Software
Software
Out-of-date software
Poorly written applications
Poorly written applications
Poorly written applications
Software
Deliberately placed weaknesses
Software
Deliberately placed weaknesses
Software
Deliberately placed weaknesses
Software
Configuration errors
Software
Software
Software
Media
Communications
Configuration errors
Configuration errors
Configuration errors
Communications
Communications
Communications
Human
Poorly defined procedures
Human
Human
Poorly defined procedures
Poorly defined procedures
Human
Poorly defined procedures
Human
Human
Human
Poorly defined procedures
Poorly defined procedures
533560237
Out of date antivirus
software
Missing patches
Cross site scripting
SQL injection
Code weaknesses such as
buffer overflows
Vendor backdoors for
management or system
recovery
Spyware such as
keyloggers
Trojan horses
Manual provisioning
leading to inconsistent
configurations
Systems not hardened
Systems not audited
Systems not monitored
Electrical interference
Unencrypted network
protocols
Connections to multiple
networks
Unnecessary protocols
allowed
No filtering between
network segments
Insufficient incident
response preparedness
Manual provisioning
Insufficient disaster
recovery plans
Testing on production
systems
Violations not reported
Poor change control
Stolen credentials
Last printed 2/15/2016 2:36:00 PM
Download