Domain 3 - Risk Identification, Monitoring, and Analysis Flashcards

1
Q

Risk

A

A function of the likelihood of a given threat source’s exercising a potential vulnerability, and the resulting impact of that adverse event on the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIST 800-30 R1

A

Risk Management Guide for Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Likelihood

A

The probability that a potential vulnerability may be exercised within the construct of the associated threat environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat Source

A

Either intent and method targeted at the intentional exploitation of a vulnerability or a situation or method that may accidentally trigger a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat

A

The potential for a threat source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability

A

A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised and result in a security breach or a violation of the system’s security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Impact

A

The magnitude of harm that could be caused by a threat’s exercise of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asset

A

Anything of value that is owned by an organization. Assets include both tangible items such as information systems and physical property and intangible assets such as intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Management

A

Process of identifying risks, assessing their potential impacts to the organization, determining the likelihood of their occurrence, communicating findings to management and other affected parties, and developing and implementing risk mitigation strategies to reduce risks to levels that are acceptable to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Assessments

A

Assess threats to Information Systems, system vulnerabilities, and weaknesses, and the likelihood that threats will exploit these vulnerabilities and weaknesses to cause adverse effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIST Risk Assessment Process

A

Step 1: Prepare for Assessment
Step 2: Conduct Assessment
Step 3: Communicate Results
Step 4: Maintain Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat Statement

A

Given after the threat identification process, and lists potential threat sources that could exploit system vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NIST Risk Assessment: Conduct Assessment Step

A
  1. Identify Threat Sources and Events
  2. Identify Vulnerabilities and Predisposing Conditions
  3. Determine Likelihood of Occurrence
  4. Determine Magnitude of Impact
  5. Determine Risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SLE

A

Single Loss Expectancy

Represents the expected monetary loss to an organization from a threat to an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ALE

A

Annualized Loss Expectancy

Expected annual loss because of a risk to a specific asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARO

A

Annualized Rate of Occurrence

Expected number of exploitations by a specific threat of a vulnerability to an asset in a given year.

17
Q

SLE Formula

A

SLE = Asset Value x Exposure Factor

18
Q

ALE Formula

A

ALE = SLE x ARO

19
Q

Quantitative Assessment vs Qualitative Assessment

A

Quantitative = Dollar Value

Qualitative = Non Dollar Value (Customer Confidence, public relations…)

20
Q

Goal of Risk Treatment

A

Reduce risk exposure to levels that are acceptable to the organization.

21
Q

Risk Treatment Strategies

A

Risk Mitigation
Risk Transference
Risk Avoidance
Risk Acceptance

22
Q

What are the 3 categories of control?

A

Technical
Managerial
Operational

23
Q

Residual Risk

A

Risk that remains after the risk reduction and mitigation efforts are complete.

24
Q

Ways to treat Residual Risk?

A

Transfer, Avoidance, Acceptance

25
Q

Most common Risk Transference?

A

3rd Party Insurance

26
Q

Risk Register

A

Location where Risk is Aggregated.

Way for an organization to know their possible exposure at a given time.

27
Q

Step the Risk Register addresses Risk Management

A
  1. Identifying the Risk
  2. Evaluating the severity of any identified risks
  3. Applying possible solutions to those risks.
  4. Monitoring and analyzing the effectiveness of any subsequent steps taken.
28
Q

Security Audit

A

Evaluation of how well the objectives of a security framework are met.

29
Q

Security Audits Serve what two purposes for the security practitioner?

A
  1. Point out areas where security controls are lacking, policy isn’t being enforced, or ambiguity exists.
  2. Emphasize security things that are being done right.
30
Q

OS Fingerprinting

A

Process where a scanner can determine the OS of the host by analyzing the TCP/IP stack flag settings.

31
Q

Stimulus & Response Algorithms

A

Identify application software versions and then reference these versions with known vulnerabilities.

32
Q

Privileged Logon Ability

A

The ability to automatically log onto a host or group of hosts with user credentials for a deeper look.

33
Q

Main Problems with VA Scanning?

A
  1. False Positives
  2. Crash Exposure
  3. Temporal Information
34
Q

3 Categories of Insecure Services

A
  1. Send Authentication information unencrypted.
  2. Send Data unencrypted.
  3. SMTP sending mail data in the clear that is NOT secured by an application.
35
Q

War Dialing

A

Attempts to locate unauthorized modems connected to computers that are connected to networks.

36
Q

War Driving

A

Wireless version of War Dialing

37
Q

5 Phases of a Pen Test

A
  1. Prep
  2. Information Gathering
  3. Information Evaluation and Risk Analysis
  4. Active Penetration.
  5. Analysis and Reporting
38
Q

3 Modes of Pen Testing

A
  1. White Box - Tester has complete knowledge
  2. Grey Box - Hybrid between White and Black
  3. Black Box - Assumes no prior knowledge.
39
Q

Zone Transfer

A

Special Type of Query directed at a DNS server that asks the server for the entire contents of its zone.