GCGA Ch. 8 Using Risk Management Tools Flashcards

1
Q

Risk

A

the likelihood that a threat will exploit a vulnerability. A threat is a potential danger that can compromise confidentiality, integrity, or availability. A vulnerability is a weakness in software or hardware or a weakness in a process that a threat could exploit, resulting in a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk evaluation

A

Risks are evaluated using the criteria of impact and probability/likelihood. Impact refers to the magnitude of harm that can be caused if a threat exploits a vulnerability. Probability/likelihood tells us how often we expect the risk to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk management

A

attempts to reduce risk to a level that an organization can accept, and the remaining risk is known as residual risk. Senior management is responsible for managing risk and the losses associated from residual risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Avoiding risk

A

You can avoid a risk by not providing a service or participating in a risky activity. Purchasing insurance, such as fire insurance, transfers the risk to another entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybersecurity controls

A

mitigate or reduce risks. When the cost of a control outweighs a risk, it is common to accept the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk appetite

A

refers to the amount of risk an organization is willing to accept. This varies between organizations based on their goals and strategic objectives. An organization’s risk appetite may be expansionary, conservative, or neutral. Risk tolerance refers to the organization’s ability to withstand risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk assessment

A

quantifies or qualifies risks based on different values or judgments. It starts by identifying asset values and prioritizing high-value items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Quantitative risk assessments

A

use numbers, such as costs and asset values. You begin a quantitative analysis by identifying the asset value (AV) of each asset. Next, you determine the percentage of an asset that would be damaged by the risk each time it occurs, which is known as the exposure factor (EF).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SLE

A

The single loss expectancy (SLE) is the cost of any single loss and it is calculated by multiplying the AV by the EF. The annual rate of occurrence (ARO) indicates how many times the loss will occur annually. You can calculate the annual loss expectancy (ALE) as SLE × ARO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Qualitative risk assessments

A

use judgments to prioritize risks based on likelihood of occurrence and impact. These judgments provide a subjective ranking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk assessment access

A

risk assessment results are sensitive. Only executives and security professionals should be granted access to risk assessment reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk register

A

a detailed document listing information about risks. It typically includes risk scores along with recommended security controls to reduce the risk scores. A risk matrix plots risks on a graph.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Supply chain assessment

A

evaluates a supply chain needed to produce and sell a product. It includes raw materials and all the processes required to create and distribute a finished product. Supply chain risk analyses should look at hardware providers, software providers, and service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port scanner

A

scans systems for open ports and attempts to discover what services and protocols are running on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vulnerability scanners

A

test security controls to identify vulnerabilities, a lack of security controls, and common misconfigurations. They are effective at discovering systems susceptible to an attack without exploiting the systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CVE

A

The Common Vulnerabilities and Exposures (CVE) is a dictionary of publicly known security vulnerabilities and exposures. The Common Vulnerability Scoring System (CVSS) assesses vulnerabilities and assigns severity scores in a range of 0 to 10, with 10 being the most severe.

17
Q

Vulnerability scan false positive

A

a false positive from a vulnerability scan indicates the scan detected a vulnerability, but the vulnerability doesn’t exist. A false negative indicates a vulnerability exists, but the scanner did not detect it.

18
Q

How should vulnerabilities be prioritized?

A

Vulnerabilities should be prioritized using a number of criteria, including vulnerability classification, environmental variables, industry/organizational impact, and risk tolerance/threshold.

19
Q

Credentialed scans

A

run under an account’s context and can get more detailed information on targets, such as the software versions of installed applications. They are also more accurate than non-credentialed scans, giving fewer false positives.

20
Q

Penetration test

A

an active test that attempts to exploit discovered vulnerabilities. It starts with a vulnerability scan and then bypasses or actively tests security controls to exploit vulnerabilities. Penetration tests may be focused on physical, offensive, or defensive objectives or they may use integrated approaches that combine these techniques. Penetration testers should gain consent prior to starting a penetration test. A rules of engagement document identifies the boundaries of the test.

21
Q

Passive reconnaissance

A

gathers information from opensource intelligence. Active network reconnaissance and discovery uses scanning techniques to gather information. After initial exploitation, a penetration tester uses privilege escalation techniques to gain more access. Pivoting during a penetration test is the process of using an exploited system to access other systems.

22
Q

Unknown, known, and partially known environment testing

A

testers perform a penetration test with zero prior knowledge of the environment. Known environment testing indicates that the testers have full knowledge of the environment, including documentation and source code for tested applications. Partially known environment testing indicates testers have some knowledge of the environment.

23
Q

Penetration testing vs vulnerability testing

A

Scans can be either intrusive or non-intrusive. Penetration testing is intrusive (also called invasive) and can potentially disrupt operations. Vulnerability testing is non-intrusive (also called non-invasive).

24
Q

Responsible disclosure programs for vulnerabilities

A

enable individuals and organizations to report security vulnerabilities or weaknesses they have discovered to the appropriate parties. Bug bounty programs are a type of responsible disclosure program that incentivizes individuals or organizations to report vulnerabilities by offering monetary or other rewards for valid submissions. The most common way to remediate a vulnerability is to apply a patch. In cases where patches are not possible, you may use a compensating control, segmentation, or grant an exception. After correcting a vulnerability, you should rescan the affected system to validate that the remediation was effective and that the vulnerability no longer exists.

25
Protocol analyzers (sniffers)
can capture and analyze data sent over a network. Testers (and attackers) use protocol analyzers to capture cleartext data sent across a network. Administrators use protocol analyzers for troubleshooting communication issues by inspecting protocol headers to detect manipulated or fragmented packets.
26
Captured packets
show the type of traffic (protocol), source and destination IP addresses, source and destination MAC addresses, and flags.
27
Tcpreplay
a suite of utilities used to edit packet captures and then send the edited packets over the network.
28
Tcpdump
a command-line protocol analyzer. Captured packet files can be analyzed in a graphical protocol analyzer such as Wireshark.
29
NetFlow
captures IP traffic statistics on routers and switches and sends them to a NetFlow collector.
30
Frameworks
references that provide a foundation.
31
Cybersecurity frameworks
typically use a structure of basic concepts and provide guidance on how to implement security.
32
The International Organization for Standardization (ISO)
maintains a set of common cybersecurity standards. ISO 27001 covers information security management. ISO 27002 covers information security techniques. ISO 27701 covers privacy information management. ISO 31000 covers risk management.
33
PCI DSS compliance
Organizations that handle credit cards typically comply with the Payment Card Industry Data Security Standard (PCI DSS).
34
NIST
The National Institute of Standards and Technology (NIST) publishes very popular frameworks, including their Risk Management Framework (RMF) and Cybersecurity Framework (CSF). Vendor-specific guides should be used when configuring specific systems.
35
Audits
a formal evaluation of an organization’s policies, procedures, and operations. In the world of cybersecurity, audits confirm that the organization has put security controls in place that are adequate and are effectively protecting critical assets.
36
Assessments
less formal reviews of an organization’s cybersecurity defenses. Assessments may include vulnerability scans, penetration tests, and reviews of cybersecurity controls. Many of the techniques used in an assessment may also play a role in an audit.
37
External audits
formal examinations performed by an independent auditing firm. Internal audits are performed by an auditing team within the organization itself.
38
Outcome of an audit
an attestation made by the auditor. This is a formal statement that specific security controls and processes are in place and operating effectively within an organization.