10 - Risk Management Flashcards

1
Q

Why do we need risk assessment

A
  • Avoid doing same mistakes
  • Know how many resources to use and how (GDPR, testing etc)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

5 steps to security

IIDIC

A
  • Identify the target
  • Identify the source of insecurity
  • Determine the threats
  • Implement measures that protect assets in a cost effective manner
  • Continuous review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk Management vs Risk Assessment

A

Risk assessment is the identification phase
Risk management includes assessment AND implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk is a function that takes into account?

A

THreat, Asset and vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk management meaning

A
  • Minimisation of risks
  • Control affects of risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Techniques of risk management

AMCTAR

A
  • Avoidance
  • Mitigation
  • Cost Benefit analysis
  • Transfer (the risk to 3rd party)
  • Acceptance
  • Residual Risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk
Inappropriately configed firewall rule set allows unauth LAN access

Avoid:
Reduce:
Transfer

A

Avoid: Periodic review of firewall
Reduce: Install IDS: weekly scanning
Transfer: Outsource net management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk assessment: List based on asset or threat

A

Asset

List each asset THEN the threat to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 Challenges of Risk Assessment

SIE

A
  • Static process for moving target
  • Information availability
  • Estimating the impact
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Quantitiative Risk Assessment vs Qualitative

A
  • Quantitative: Calculates absolute financial values, losses and costs
  • Qualitative: Calculates relative values, losses and costs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk between likelihood and impact

A

Imagine 3x3 grid with impact and likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

First thing you try to test a vulnerability

A

pen testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk ID: Threats to consider (… or …_

A
  • External or internal
  • Natural or manmade
  • Intentional or accidental
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk ID: Identifying vulnerabilities

A
  • Audit
  • Certification/accreditation records
  • Sys logs
  • prior events
  • trouble reports
  • incident response teams
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat and vulnerability paired = ____

A

Threat Action showing the impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Prior to conducting risk assessement:

A
  • Identify assessment scope (mission)
  • Review previous findings
17
Q

Identifying assets and activites

A

Make a list and prioritise

18
Q

List of assets to consider:

A
  • Physical
  • Hardware
  • Software
  • Personnel (eg is a job done by just one person)
  • Data and information
19
Q

Internal assessments

A

Security pros exploit internal systems to learn about vulnerabilties

20
Q

External assessments

A

Personnel outside the company exploit systems to learn

21
Q

Procedure for vulnerability assessment

A
  • Documentation
  • Review logs
  • Vulnerability scans and other assessment tools
  • audit and personnel interviews
  • System testing
  • Verifying user rights and permissions
22
Q

Exploit assessments

A

Attempt to simulate an attack to see if it can succeed.

23
Q

2 Different controls

A

In-place (in the operational system)
Planned (in documents)

24
Q

Control classes

A

Procedural
Technical
Physical

25
Q

Procedural Class examples

A
  • Policies
  • Security Plans
  • Insurance
  • Awareness and training
26
Q

3 Technical Class examples

A
  • Login identifier
  • System logs
  • Firewalls
27
Q

Physical Class examples

A
  • Locked doors
  • Video cameras
  • Fire detection
28
Q

WannaCry 2017

A

NHS using outdated and unpatched Win7/WinXP versions
They had been warned a year before
Lack of clear disaster recovery plan

29
Q

Hive Ransomware

A

Vulnerability in Microsoft’s Exchange Server (ProxyShell)
Over 1,500 victims