Cybersecurity Vulnerability Assessment Flashcards

1
Q

What is Risk?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How risk will be addressed?

A

Design: one form of mitigation is to change the design of the system so the risk is removed.

Reduce: risks can be decreased to an acceptable level through the implementation of countermeasures that reduce the likelihood or consequence of an attack.

Transfer: it may be possible to establish some sort of insurance or agreement that transfers some or all of the risk to a third entity.

Eliminate: a good risk assessment process will identify these types of controls that need to be addressed.

Accept: there is always an option to accept the risk, to see it as the cost of doing business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why conduct cybersecurity vulnerability assessment?

A

It defines, identifies, and classifies the security vulnerabilities in an industrial control system and its related network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Cybersecurity Vulnerability Assessments?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

High Level or GAP Assessment

A
  • Assessment of an organization’s existing operational and technical cybersecurity practices
  • Comparision to industry regulations, standars and best practices
  • Feedback on performance relative to industry peers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Passive Assessment

A
  • Discover network devices using passive means such as:
    1. Reviewing drawings
    2. System walk throughs
    3. Traffic analysis
    4. ARP tables
  • Discover vulnerabilities using passive means such as:
    1. Capture and study actual network traffic
    2. Collect data from devices (e.g. logs)
    3. Review configurations
    4. Research using vulnearability databases
  • Understand system and process
  • Create or update documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Active Assessments

A
  • Discover network devices and vulnerabilities using scanning tools and techniques:
  • Nmap / Advanced IP Scanner, Superscan, Shodan, Nessus, Nexpose, Retina
  • Understanding system and the process
  • Create or update documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Penetration Testing

A
  • Begins with an active cybersecurity vulnerability assessment
  • Perspective of a potential attacker
  • Attemps to exploit known and unknown security vulnerabilities using exploit tools and techniques
  • Validate effectiveness of security countermeasures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Conducting an IACS Gap Assessment

A
  1. Identify benchmark standards
  2. Gather information
  3. Compare performance with benchmark standards
  4. Document and report results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Benefit of CSET

A
  • Repeatable and systematic approach for assessing an organizations cybersecurity posture
  • Evaluation and comparision to existing industry standards and regulations
  • Facilitates discussion and input from subjet matter experts throughout the organization
  • Identifies potential vulnerabilities in the control system design and security policies
  • Offers guidelines for IACS cybersecurity solutions and mitigation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CSET

A

Cyber Security Evaluation Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CSET Process

A
  1. Form Team
  2. Add Assessment Information
  3. Select Mode and Standards
  4. Determine Security Level
  5. Build Network Diagram
  6. Answer Questions
  7. Analyze Results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the different types of vulnerability assessments?

A
  • High-level Gap
  • Pasive Vulneravility
  • Active Vulnerability
  • Penetration Test
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between passive and active techniques?

A

Passive assessments: discover network devices and vulnerabilities using passive means such as reviewing drawings, system walk-throughs and data collection from devices.

Active assessments: discover network devices and vulnerabilities using network scanning tools and techniques such as Nmap and Nessus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between a vulnerability assessment and a penetration test?

A

Vulnerability Assessments
* Define, identify, and calssify security vulnerabilites
* Identify waknesses
* Report on discoveries

Penetration Testing
* Exploit vulnerabilities
* Attemp to gain non-authorized access
* Aggressive tools and techniques to attack and penetrate the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the assessment tool created by The Department of Homeland Security which manges many of the steps in an assessment?

A

CSET
Cyber Security Evaluation Tool

17
Q

Which Cybersecurity Vulnerability Assessment is the most invasive in an IACS system?

A

Penetration Test

18
Q

Which assessment is conducted form the perspective of a potential attacker and attemps to exploit known and unknown security vulnerabilities?

A

Penetration Testing

19
Q

Which gap assessment tool was created by the US Departmant of Homeland Security?

A

CSET

20
Q

System walk-througs, reviwing drawings and collecting data from devices ara examples of:

A

Passive Assessment

21
Q

What type of vulnerability assessment technique involves using automated network scanning tools but not using exploit tools?

A

Active vulnerability assessment

22
Q

Which vulnerability assessment provides feedback on perfomance in comparision to industry peers?

A

Gap Assessment