4.3 Flashcards

1
Q

4 Step process for identifying vulnerabilities

A

planning-Establish policies, procedures, and mechanisms to systematically track
and evaluate vulnerabilities
testing -Evaluate patches and updates in a controlled environment before
deploying them across the entire enterprise network
implementation -Deploy patches and updates across devices and applications
auditing-Ensure that security patches and configuration changes have been
implemented effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat intelligence feeds

A

Provide valuable information about potential or current threats to an
organization’s security
Collected, analyzed, and disseminated by security researchers, organizations, or
automated tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat intelligence

A

Continuous process to comprehend the specific threats an organization faces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OSINT

A

open source intelligence
Collected from publicly available sources like reports, forums, news
articles, blogs, and social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Responsible Disclosure

A

Ethical practice for disclosing vulnerabilities in software, hardware, or online service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bug Bounty Programs

A

Robust responsible disclosure programs incentivizing security researchers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability Confirmation

A

Determining the accuracy of identified potential security weaknesses
● True Positive
○ Real and exploitable vulnerability correctly identified
● False Positive
○ Incorrectly stated vulnerability
● True Negative
○ Correctly identifies the absence of a vulnerability
● False Negative
○ Serious finding – vulnerability exists but remains undetected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CVSS

A

common vulnerability scoring system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CVE

A

common vulnerabilities and exposures
system that provides a standadized way to uniquely identify and reference known vulnerabilities in software and hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EF

A

A quantifiable metric to estimate the percentage of asset damageR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk Tolerance

A

The level of risk an organization is willing to accept
■ Determines the urgency of vulnerability remediation
■ High risk tolerance may allow monitoring of certain vulnerabilities
■ Low risk tolerance may require swift remediation of even minor vulnerabilitie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PAtching

A

Process of applying updates to fix software, system, or application vulnerabilities
■ Patches released by software vendors
■ End users must update their software to apply security patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Insurance Policy

A

Procuring a cybersecurity insurance policy as a risk management strategy
■ Mitigates financial losses resulting from cyber incidents (data breach, network
outage, business interruption)
■ Covers mitigation, remediation, recovery costs, legal fees, public relations, and
customer notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Exception

A

Temporarily relaxing or bypassing security controls or policies for operational business needs with an understanding of associated risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Exemption

A

A permanent waiver of security controls or policies due to specific
reasons, often for legacy systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remediation

A

Involve installing patches, reconfiguring devices, or other actions

17
Q

Auditing

A

nvolves systematic review of logs, configurations, and patches
● Ensures alignment with established security standards and policies

18
Q

Configuration Auditing

A

checks for misconfigurations of deviations

19
Q

Verification

A

Final step in validating remediation
● Involves testing systems to confirm patches and configuration changes

20
Q

Vulnerability Reporting

A

Process of documenting and communicating security weaknesses in software or
systems to individuals and organizations responsible for addressing the issues
■ Reports should use clear, concise, and transparent language
■ Confidentiality is crucial to prevent exploitation, reputation damage, and legal
repercussion

21
Q

Internal vulnerability reporting

A

First line of defense in vulnerability management within the organization
■ Identifying, documenting, and communicating vulnerabilities within the
organizational structure
■ Information remains internal
■ Timely reporting reduces exposure to unpatched vulnerabilities
■ Establish clear communication paths and protocols

22
Q

External vulnerability reporting

A

eporting vulnerabilities outside the organization, involving vendors, partners,
customers, or the public
■ Coordinating with vendors to address vulnerabilities for the benefit of all
customers
■ Sharing non-sensitive details with databases like CVE or vendor knowledge bases
■ Respect privacy when discussing vulnerabilities with external organizations