Vulnerability Categories
These are a list of the categories that are marked for in Cyber Centurion, with some examples.
Account Policies
- Password Policy
- Lockout Policy
- ...
Application Security Settings
- Critical Service Settings
- Required Application Settings
- Application Permission
- ...
Application Updates
- Application Updates
- Application Automatic Update Settings
- ...
Defensive Countermeasures
- Firewall
- Anti-virus
- Encryption
- ...
Forensics Questions
Local Policies
- Audit Policy
- User Rights Assignment
- Security Options --
- Network Security Options
- Privilege Elevation Authorization
- ...
- ...
Operating System Updates
- Windows Updates
- Service Packs
- Windows Automatic Update Settings
- ...
Policy Violation: Malware Backdoors
- Remote Administration Tools
- Keyloggers
- Password Sniffers
- ...
Policy Violation: Prohibited Files
- Media Files
- Software Archives
- Confidential Information
- ...
Policy Violation: Unwanted Software
- Games
- Servers
- Scareware
- Adware
- PUP
- "Hacking" Tools
- ...
Service Auditing
- Enable and Disable Services
- ...
Uncategorized Operating System Settings
- Remote Access
- File Sharing
- Screen Locking
- Group Policy Settings
- Operating System
- Permissions
- ...
User Auditing
- Authorized Users
- Groups, and other settings unique to users
- ...