Chapter 8 Using Risk Management Tools Flashcards

1
Q

A risk is the likelihood that a threat will exploit a vulnerability. A threat is a potential danger that can compromise confidentiality, integrity, or availability of data or a system. A vulnerability is a weakness.

A

Impact refers to the magnitude of harm that can be caused if a threat exercises a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat assessments help an organization identify and categorize threats. An environmental threat assessment evaluates the likelihood of an environmental threat, such as a natural disaster, occurring. Manmade threat assessments evaluate threats from humans.

A

Internal threat assessments evaluate threats from within an organization. External threat assessment evaluates threats from outside an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A vulnerability is a flaw or weakness in software or hardware, or a weakness in a process that a threat could exploit, resulting in a security breach.

A

Risk management attempts to reduce risk to a level that an organization can accept, and the remaining risk is known as residual risk. Senior management is responsible for managing risk and the losses associated from residual risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You can avoid a risk by not providing a service or participating in a risky activity. Purchasing insurance, such as fire insurance, transfers the risk to another entity. Security controls mitigate, or reduce, risks. When the cost of a control outweighs a risk, it is common to accept the risk.

A

A risk assessment quantifies or qualifies risks based on different values or judgments. It starts by identifying asset values and prioritizing high-value items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Quantitative risk assessments use numbers, such as costs and asset values. The single loss expectancy (SLE) is the cost of any single loss. The annual rate of occurrence (ARO) indicates how many times the loss will occur annually. You can calculate the annual loss expectancy (ALE) as SLE × ARO.

A

Qualitative risk assessments use judgments to prioritize risks based on likelihood of occurrence and impact. These judgments provide a subjective ranking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk assessment results are sensitive. Only executives and security professionals should be granted access to risk assessment reports.

A

A risk register is a detailed document listing information about risks. It typically includes risk scores along with recommended security controls to reduce the risk scores.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A supply chain assessment evaluates a supply chain needed to produce and sell a product. It includes raw materials and all the processes required to create and distribute a finished product.

A

A port scanner scans systems for open ports and attempts to discover what services and protocols are running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network mapping identifies the IP addresses of hosts within a network. Network scanners expand on network mapping. They identify the operating system running on each host. They can also identify services and protocols running on each host.

A

Wireless scanners can detect rogue access points (APs) in a network. Many can also crack passwords used by the APs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Banner grabbing queries remote systems to detect their operating system, along with services, protocols, and applications running on the remote system.

A

Vulnerability scanners passively test security controls to identify vulnerabilities, a lack of security controls, and common misconfigurations. They are effective at discovering systems susceptible to an attack without exploiting the systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A false positive from a vulnerability scan indicates the scan detected a vulnerability, but the vulnerability doesn’t exist. Credentialed scans run under the context of an account and can be more accurate than non-credentialed scans, giving fewer false positives.

A

Penetration testers should gain consent prior to starting a penetration test. A rules-of-engagement document identifies the boundaries of the test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A penetration test is an active test that attempts to exploit discovered vulnerabilities. It starts with a vulnerability scan and then bypasses or actively tests security controls to exploit vulnerabilities.

A

Passive reconnaissance gathers information from open-source intelligence. Active reconnaissance uses scanning techniques to gather information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

After initial exploitation, a penetration tester uses privilege escalation techniques to gain more access. Pivoting during a penetration test is the process of using an exploited system to access other systems.

A

In black box testing, testers perform a penetration test with zero prior knowledge of the environment. White box testing indicates that the testers have full knowledge of the environment, including documentation and source code for tested applications. Gray box testing indicates some knowledge of the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scans can be either intrusive or non-intrusive. Penetration testing is intrusive (also called invasive) and can potentially disrupt operations. Vulnerability testing is non-intrusive (also called non-invasive).

A

Exploitation frameworks store information about security vulnerabilities. They are often used by penetration testers (and attackers) to detect and exploit software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protocol analyzers (sniffers) can capture and analyze data sent over a network. Testers (and attackers) use protocol analyzers to capture cleartext data sent across a network.

A

Administrators use protocol analyzers for troubleshooting communication issues by inspecting protocol headers to detect manipulated or fragmented packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Captured packets show the type of traffic (protocol), source and destination IP addresses, source and destination MAC addresses, and flags.

A

Tcpdump is a command-line protocol analyzer. Captured packet files can be analyzed in a graphical protocol analyzer such as Wireshark.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Nmap is a sophisticated network scanner run from the command line. Netcat is a command-line tool used to remotely administer servers. Netcat can also be used for banner grabbing.

A

Logs record events and by monitoring logs, administrators can detect event anomalies. Security logs track logon and logoff activity on systems. System logs identify when services start and stop.

17
Q

Firewall and router logs identify the source and destination of traffic.

A

A security information and event management (SIEM) system can aggregate and correlate logs from multiple sources in a single location. A SIEM also provides continuous monitoring and automated alerting and triggers.

18
Q

Continuous security monitoring helps an organization maintain its security posture, by verifying that security controls continue to function as intended.

A

User auditing records user activities. User auditing reviews examine user activity. Permission auditing reviews help ensure that users have only the rights and permissions they need to perform their jobs, and no more.

19
Q

Some typical stages used with the waterfall model include:

  • Requirements.
  • Design.
  • Implementation.
  • Verification.
  • Maintenance.
A

A challenge with the waterfall model is that it lacks flexibility. It is difficult to revise anything from previous stages.

20
Q

The agile model uses a set of principles shared by cross-functional teams. These principles stress interaction, creating a working application, collaborating with the customer, and responding to change.

A

Secure DevOps is a software development process that includes extensive communication between software developers and operations personnel.

21
Q

secure DevOps project are summarized in the following bullets:

  • Security automation
  • Continuous integration
  • Baselining
  • Immutable systems
  • Infrastructure as code
A

Security automation uses automated tests to check code. When modifying code, it’s important to test it and ensure that the code doesn’t introduce software bugs or security flaws. It’s common to include a mirror image of the production environment and run automated tests on each update to ensure it is error free.

22
Q

• Continuous integration refers to the process of merging code changes into a central repository. Software is then built and tested from this central repository. The central repository includes a version control system, and the version control system typically supports rolling back code changes when they cause a problem.

A

Part 1, • Baselining refers to applying changes to the baseline code every day and building the code from these changes. For example, imagine five developers are working on different elements of the same project. Each of them have modified and verified some code on their computers. At the end of the day, each of these five developers uploads and commits their changes.

23
Q

Someone then builds the code with these changes and then automation techniques check the code. The benefit is that bugs are identified and corrected quicker. In contrast, if all the developers applied their changes once a week, the bugs can multiply and be harder to correct.

A

Immutable systems cannot be changed. Within the context of secure DevOps, it’s possible to create and test systems in a controlled environment. Once they are created, they can be deployed into a production environment. As an example, it’s possible to create a secure image of a server for a specific purpose. This image can be deployed as an immutable system to ensure it stays secure.

24
Q

Infrastructure as code refers to managing and provisioning data centers with code that defines virtual machines (VMs). Chapter 1 introduces virtualization concepts and many VMs are created with scripts. Once the script is created, new VMs can be created just by running the script.

A

Some of the common methods of testing code include:

25
Q

Fuzzing uses a computer program to send random data to an application.

A

Software development kits (SDKs) are like third-party libraries, but they are typically tied to a single vendor.

26
Q

Dead code is code that is never executed or used. In this example, the copied code to create and modify users isn’t used in the new application, so it is dead code.

A

There are two important points about error reporting:

27
Q

You can view logs using the System Log Viewer on Linux systems or by using the cat command from the terminal.

cat /var/ log/ auth.log

A

var/ log/ messages.

var/ log/ boot.log.

var/ log/ auth.log.