Lecture 9 Flashcards

1
Q

What is the goal of vulnerability management in a SOC?

A

The goal is to identify and respond to potential weaknesses in IT systems to reduce the organization’s risk by addressing identified vulnerabilities. This process helps in reducing the attack surface and the number of possible targets for cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the six phases of the vulnerability management process?

A

The six phases are: Asset Inventory, Information Management, Risk Assessment, Vulnerability Assessment, Report and Remediate, and Respond and Repeat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is asset inventory important in vulnerability management?

A

Asset inventory is crucial because it involves identifying all assets on the network, including endpoints and network connections, to ensure comprehensive vulnerability assessment and management​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the challenges associated with manual network access control (NAC)?

A

Manual NAC involves securing each network port individually, which can be bypassed if an attacker spoofs a trusted MAC address. This approach also requires significant effort to maintain and monitor all network ports manually​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do network scanners contribute to asset inventory?

A

Network scanners, such as Nmap, identify devices on the network and develop an asset list. They are used in combination with NAC to ensure all devices are accounted for, enhancing the accuracy of asset inventory​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of the Information Management phase in vulnerability management?

A

This phase involves collecting detailed information about all devices, including installed applications, patch levels, and configurations, to identify potential vulnerabilities accurately​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the Risk Assessment phase in vulnerability management.

A

Risk Assessment evaluates the risk associated with each identified vulnerability, prioritizing them based on their potential impact and likelihood of exploitation. This helps in determining which vulnerabilities to address first​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What role does a case management system play in vulnerability management?

A

A case management system tracks how vulnerabilities are addressed, ensuring none are overlooked and that they are prioritized based on their risk and time in the queue​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What factors are considered in the Report and Remediate phase?

A

This phase considers the risk of the vulnerability, the potential impact of remediation actions, and the required steps for remediation. It involves reporting identified vulnerabilities and recommended actions, documenting the process for future reference​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Respond and Repeat phase entail?

A

This phase involves implementing planned responses to vulnerabilities and continuously repeating the cycle to address new and existing vulnerabilities. It includes proactive measures to reduce the risk of repetitive vulnerabilities​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How are vulnerabilities measured using the Common Vulnerability Scoring System (CVSS)?

A

CVSS measures vulnerabilities based on their intrinsic qualities (Base), characteristics that change over time (Temporal), and user environment specifics (Environmental), producing a numerical score reflecting their severity​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the key tools needed for vulnerability management in a SOC?

A

Key tools include vulnerability scanners to identify potential vulnerabilities, case management systems to track vulnerabilities, and network scanning tools to ensure comprehensive coverage​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the benefits and limitations of active scanning for vulnerabilities?

A

Active scanning evaluates targets over the network (network scanning) or with host-level access (host scanning). Network scanning provides an attacker’s perspective but may miss some vulnerabilities. Host scanning offers accurate data but requires permission and resources​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of exploitation tools in vulnerability management?

A

Exploitation tools, such as Metasploit, are used in penetration testing to validate vulnerabilities by exploiting them. This helps prioritize validated vulnerabilities for remediation​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three metric groups in CVSS?

A

The three metric groups are:

Base: Represents the intrinsic qualities of a vulnerability.
Temporal: Reflects characteristics that change over time.
Environmental: Represents characteristics unique to a user’s environment​​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What roles are crucial in a vulnerability management service?
A: Key roles include:

A

Security Officer: Oversees the vulnerability management program.
Security Engineer: Handles scans, selects vulnerabilities to address, and documents the lifecycle.
IT Team: Manages the network and assists with vulnerability detection.
Asset Owners: Determine the response to vulnerabilities found in their systems​​.