CH 11 Vulnerability and Risk Assessment Flashcards
Risk organization
Transfer the risk to another organization or third party.
■ Avoid the risk.
■ Reduce the risk.
■ Accept some or all of the consequences of a risk.
Qualitative
Assigns numeric values
1–100.
ex
Quantitative
Measures risk by using exact monetary
values. It
ex SLE × ARO = ALE
MTBF) .
average number of failures per million
hours of operation for a product in question.
MTTF)
which is a basic measure of reliability for devices that cannot be
repaired
MTTR
time 2 repair problem
Management controls:
Managers set procedures, policies, legal and regulatory and SDLC
operation controls
executed by people
ppl training
Tech contols
logical controls executed by the computer
system. Technical controls include authentication, access control, auditing,
and cryptography
Uses Raid 5
security controls:
Prevent detective corrective
Prevent
NIPSs to prevent malicious activity, and
RAID 1 to prevent loss of data.
detct catch action
CCTV/video surveillance, alarms, NIDSs, and auditing.
Corrective
limit the
extent of damage an
password-cracking methods.
Dictionary attack brute force
Dictionary
prearranged list of likely words,
ex anbcdd