Page 1164 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1164

Managing Patches and Reducing

               Vulnerabilities


               Patch management and vulnerability management processes work
               together to help protect an organization against emerging threats.

               Bugs and security vulnerabilities are routinely discovered in operating
               systems and applications. As they are discovered, vendors write and
               test patches to remove the vulnerability. Patch management ensures
               that appropriate patches are applied, and vulnerability management
               helps verify that systems are not vulnerable to known threats.


               Systems to Manage


               It’s worth stressing that patch and vulnerability management doesn’t
               only apply to workstations and servers. It also applies to any
               computing device with an operating system. Network infrastructure
               systems such as routers, switches, firewalls, appliances (such as a
               unified threat management appliance), and printers all include some
               type of operating system. Some are Cisco-based, others are Microsoft-

               based, and others are Linux-based.

               Embedded systems are any devices that have a central processing unit
               (CPU), run an operating system, and have one or more applications
               designed to perform one or more functions. Examples include camera
               systems, smart televisions, household appliances (such as burglar
               alarm systems, wireless thermostats, and refrigerators), automobiles,
               medical devices, and more. These devices are sometimes referred to as

               the Internet of Things (IoT).

               These devices may have vulnerabilities requiring patches. As an
               example, the massive distributed denial-of-service attack on Domain
               Name System (DNS) servers in late 2016 effectively took down the
               internet by preventing users from accessing dozens of websites.
               Attackers reportedly used the Mirai malware to take control of IoT

               devices (such as Internet Protocol [IP] cameras, baby monitors, and
               printers) and join them to a botnet. Tens of millions of devices sent
               DNS lookup requests to DNS servers, effectively overloading them.
   1159   1160   1161   1162   1163   1164   1165   1166   1167   1168   1169