2.2 Risk Management and Threat Modeling Flashcards

1
Q

vulnerability

A

the aspect of a business that can be exploited to compromise a system’s CIA (confidentiality, integrity, or availability).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

threat

A

an actor that might exploit a vulnerability.
-can be intentional (a malicious hacker steals data), unintentional (an incompetent sysadmin destroys the network), or due to a natural disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

risk

A

the possibility of losing something valuable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk analysis:

A

Understanding what risks an organization faces, which are most severe, and which are most likely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk management:

A

Using the results of such an analysis to determine how to deploy personnel and spend budget.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat modeling:

A

Determining which attacks an organization is most likely to experience, who is most likely to launch them, and what can be done to stop them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat Modeling Methodologies

PASTA (Process for Attack Simulation and Threat Analysis)

A

Aims to align consideration of business objectives with technical requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat Modeling Methodologies

STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, DoS (Denial of Service), Elevation of Privilege)

A

Focuses on identifying what can fail in the system being modeled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat Modeling Methodologies

OWASP (Open Web Application Security Project)

A

Focuses on identifying possible threats, prioritizing risks, and planning mitigation strategies. It is mainly applied to the analysis of applications, such as web or desktop apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OWASP process consists of six steps:

A
  1. Determine Assessment Scope
  2. Identify Threat Agents
  3. Identify Possible Attacks
  4. Identify Exploitable Vulnerabilities
  5. Rank/Prioritize Risks
  6. Mitigate Risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Determine Assessment Scope

A

Listing the assets under consideration, determining their value, and defining objectives for your threat modeling assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identify Possible Attacks:

A

Identify the attacks that each threat agent is likely to perform, based on how much skill and funding they have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identify Exploitable Vulnerabilities:

A

Identify ways for data to enter and exit the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asset inventory

A

the process of identifying and assigning an asset value (financial worth of an asset) to all of an organization’s assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

exposure factor

A

measuring “how much” of an asset will be affected in the event of a breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Loss expectancy

A

a measure of how much money an organization will lose in the event of a given breach.

17
Q

Single loss expectancy (SLE)

A

as the estimated cost of the occurrence of a risk on a given asset; the estimated cost each time the risk occurs.
calculated as: SLE = AV x EF,

18
Q

Annual loss expectancy (ALE)

A

the metric determining the cost of a risk reoccurring.
calculated as: ALE = ARO x SLE, where ALE is annual loss expectancy, ARO is annual rate of occurrence, and SLE is single loss expectancy.

19
Q

Annual rate of occurrence (ARO)

A

as an estimate of how many times a risk is likely to occur in a given year.
ARO = X / years, ARO is annual rate of occurrence, X occurrence(s), and years is per number of years.

20
Q

Marginal (loss expectancy)

A

The organization has sufficient resources to respond to the breach immediately, without affecting day-to-day operations or revenue.

21
Q

Notable (loss expectancy)

A

The organization has sufficient resources to respond to the breach, but may not be able to do so immediately. It may experience interruptions to operations.

22
Q

Severe (loss expectancy)

A

The organization experiences serious interruptions to operations, and does not have sufficient monetary and/or personnel resources to respond to the breach effectively. It may have to defer revenue, delay project timelines, reassign employees, and/or hire consultants to address the issue.

23
Q

Catastrophic (loss expectancy)

A

The organization suffers severe, lasting damage to its reputation and/or infrastructure. The future of the business is threatened by reputational damage, bankruptcy, being found in contempt of federal regulations, etc.

24
Q

risk matrix

A

used to compare how many of the risks an organization faces are mild versus how many are severe.

25
Q

heat map

A

a visual representation of the probability and likelihood of risks to an organization.
Heat maps provide organizations with the capability to make strategic decisions designed to protect the company.