7.0 Vulnerability Management Flashcards
Identifying and managing the risks to a network, including the operating system, applications, and other components of an organization’s IT operations.
Vulnerability management
Utilizes automated scanning processes to identify and evaluate potential issues.
Vulnerability scan
Real-time, continuously updated sources of information about potential threats and vulnerabilities.
Threat feed
We pay you to hack into systems to make sure people can’t hack into systems (a very off quote from Sneakers).
Penetration testing
the foundational software that controls hardware and can contain significant vulnerabilities. For instance, the Meltdown and Spectre vulnerabilities identified in 2018 impacted almost all computers and mobile devices. The exposure was associated with the processors used inside the computer and allowed malicious programs to steal data as it was being processed. Another vulnerability, “LoJax,” discovered in the Unified Extensible Firmware Interface (UEFI) firmware in 2018, enabled attackers to persist on a system even after a complete hard drive replacement or OS reinstallation
Firmware Vulnerabilities
These feeds are typically free and accessible to all, making them a cost-effective solution for smaller organizations or those with limited budgets. However, they may lack the depth, breadth, or sophistication of analysis found in proprietary feeds.
Open Source threat feeds
provide more comprehensive information and advanced analytic insights. However, these feeds come at a cost, and the return on investment will depend on an organization’s specific needs, risk profile, and resources.
Proprietary threat feeds
Behavioral Threat Research
is narrative commentary describing examples of attacks and TTPs gathered through primary research sources.
is lists of IP addresses and domains associated with malicious behavior, plus signatures of known file-based malware.
Reputational threat intelligence
is computer data that can correlate events observed on a customer’s networks and logs with known TTP and threat actor indicators.
Threat Data
describes collecting and analyzing publicly available information and using it to support decision-making. In cybersecurity operations, this is used to identify vulnerabilities and threat information by gathering data from many sources such as blogs, forums, social media platforms, and even the dark web. This can include information about new types of malware, attack strategies used by cybercriminals, and recently discovered software vulnerabilities.
Open-source intelligence (OSINT)
Threat feed ______________ are collaborative groups that exchange data about emerging cybersecurity threats and vulnerabilities. These organizations collect, analyze, and disseminate threat intelligence from various sources, including their members, security researchers, and public sources. Members of these organizations, often composed of businesses, government entities, and academic institutions, can benefit from the shared intelligence by gaining insights into the latest threats they might not have access to individually. They can use this information to fortify their systems and respond swiftly to emerging threats.
Information-sharing organization
another proactive strategy and describe when organizations incentivize discovering and reporting vulnerabilities by rewarding external security researchers or “white hat” hackers.
Bug bounties
are comprehensive reviews designed to ensure an organization’s security posture aligns with established standards and best practices. There are various types, including compliance audits, which assess adherence to regulations like GDPR or HIPAA; risk-based audits, which identify potential threats and vulnerabilities in an organization’s systems and processes; and technical audits, which delve into the specifics of the organization’s IT infrastructure, examining areas like network security, access controls, and data protection measures.
Auditing
Vulnerability Analysis
Vulnerability analysis supports several critical aspects of an organization’s cybersecurity strategy, including prioritization, vulnerability classification, exposure considerations, organizational impact, and risk tolerance contexts.
Prioritization
Vulnerability analysis prioritizes remediation efforts by identifying the most critical vulnerabilities in an organization. Prioritization is typically based on factors such as vulnerability severity, the ease of exploitation, and the potential impact of an attack. Prioritizing vulnerabilities helps an organization focus limited resources on addressing the most significant threats first.
Classification
Vulnerability analysis aids in vulnerability classification, categorizing vulnerabilities based on their characteristics, such as the type of system or application affected, the nature of the exposure, or the potential impact. Classification can help clarify the scope and nature of an organization’s threats.
Exposure factor
Vulnerability analysis must also consider exposure factors like the accessibility of a vulnerable system or data and environmental factors like the current threat landscape or the specifics of the organization’s IT infrastructure. These factors can significantly influence the likelihood of a vulnerability being exploited and directly impact its overall risk level.
The exposure factor (EF) represents the extent to which an asset is susceptible to being compromised or impacted by a specific vulnerability. It helps assess the potential impact or loss if the vulnerability is exploited. Factors might include weak authentication mechanisms, inadequate network segmentation, or insufficient access control methods.
Impacts
Vulnerability analysis assesses the potential organizational impact of vulnerabilities. This could include financial loss, reputational damage, operational disruption, or regulatory penalties. Understanding this impact is crucial for making informed decisions about risk mitigation.
Environmental factors
Several environmental variables play a significant role in influencing vulnerability analysis. One of the primary environmental factors is the organization’s IT infrastructure, which includes the hardware, software, networks, and systems in use. These components’ diversity, complexity, and age can affect the number and types of vulnerabilities present. For instance, legacy systems may have known unpatched vulnerabilities, while new emerging technologies might introduce unknown vulnerabilities.
The external threat landscape is another crucial environmental factor. The prevalence of certain types of attacks or the activities of specific threat actors can affect the likelihood of exploitation of particular vulnerabilities. For example, if ransomware attacks rise within the medical industry, that sector can prioritize those vulnerabilities.
The regulatory and compliance environment is another significant factor. Organizations in heavily regulated industries, like healthcare or finance, may need to prioritize vulnerabilities that could lead to sensitive data breaches and result in regulatory penalties. The operational environment, including the organization’s workflows, business processes, and usage patterns, can also influence vulnerability analysis. Certain operational practices increase exposure to specific vulnerabilities or affect the potential impact of a successful exploit. Examples include poor patch management practices, lack of rigorous access controls, lack of awareness training, poor configuration management practices, and insufficient application development policies.
Risk tolerance
Vulnerability analysis must align with an organization’s risk tolerance. Risk tolerance refers to the level of risk an organization is willing to accept, which can vary greatly depending on the organization’s size, industry, regulatory environment, and strategic objectives. By aligning vulnerability analysis with risk tolerance, an organization can ensure its vulnerability management efforts align with its overall risk management strategy.
A security assessment technique used to identify and evaluate potential weaknesses or vulnerabilities in a computer system, network, or application.
Vulnerability scan
A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.
Vulnerability