ch 11 1 Flashcards
RISK ASSESSMENT ORDER
Identify the organization’s assets.
Step 2. Identify vulnerabilities.
Step 3. Identify threats and threat likelihood.
Step 4. Identify potential monetary impact.
Qualitative
is an assessment that assigns numeric values to the
probability of a risk and the impact it can have on the system or network. Unlike
EX 0TO 100
Quantitative risk assessment measures risk by using exact monetary values.
SLE × ARO = ALE
Management controls:
how the security
of your data and systems is managed
focus on decisions and the management of risk.
EXECUTIVES SET THEM
Operational controls:
increase individual and group system security. They include user
awareness and training disaster recovery plans, incident
handling
TECHNICAL CONTROLS
logical controls executed by the computer
system. EX authentication, access control, auditing,
and cryptography.
Vulnerability management STEPS
Define the desired state of security. Create baselines.
Prioritize vulnerabilities. Mitigate vulnerabilities. Monitor the environment—
vulnerability scanning may be passive
or active, whereas penetration testing will be active
vulnerability scanning will seek out all vulnerabilities
and weaknesses within an organization
TYPES SCANS
vulnerability scan with Nessus
port scanner is Nmap.
Banner grabbing
find out information about web servers,
DICT ATTACK
Uses a prearranged list of likely words, trying each of
them one at a time. It can
Cryptanalysis attack:
Uses a considerable set of precalculated encrypted passwords
located in a lookup table. These tables are known as rainbow tables ,