2.2_ Risk Management and Threat Modeling Flashcards
What’s the difference between a vulnerability, a threat, and a risk?
A vulnerability is an aspect of a business that can be exploited to compromise a system’s CIA.
A threat is an actor that might exploit a vulnerability.
A risk is a possibility of losing something valuable.
A _________ is an aspect of a business that can be exploited to compromise a system’s CIA.
Vulnerability
A _________ is an actor that might exploit a vulnerability.
Threat
A _________ is a possibility of losing something valuable.
Risk
Using the results of risk analysis to create a plan for preventing likely risks is called what?
Risk Management
Understanding what risks face an organization, which are most severe, and which are most likely is called what?
Risk Analysis
Determining which attacks an organization is most likely to experience, who is most likely to launch them, and what actions can be done to prevent them is called what?
Threat Modeling
What is a business’s primary objective?
Profit
_____________ and _____________ directly contribute to business profit.
Risk analysis and management and threat modeling directly contribute to business profit.
_____________ helps business understand how much they’ll need to spend in the event of a given security break.
Risk Analysis
_____________ results are shared upwards to the executives who make the major business decisions.
Threat Modeling
When possible, risks are measured ___________ in financial figures, which businesses use to prioritize threats.
Quantitatively
What does PASTA stand for?
It’s a Threat Modeling Methodology:
Process for Attack Simulation & Threat Analysis
What does OWASP stand for?
Spoofing, Tampering, Repudiation, Information
Disclosure, DoS (Denial of Service), Elevation of Privilege
What are the steps involved in the OWASP Threat Modeling process?
- Determine assessment scope
- Identify threat agents
- Identify potential attacks
- Identify exploitable vulnerabilities
- Prioritize identified risks
- Mitigate risks