Lesson 4 Flashcards

1
Q

What is Risk?

A

The possibility or likelyhood of a threat exploiting a vulnerability resulting in a loss,damage or destruction of an assest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Total/inherent risk?

A

Totality of all risk before the application of countermeasures/safeguard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is residual risk?

A

remaining potential risk after all security controls or countermeasures are applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is information security risk?

A

The risk to organization’s operation, organizational assets, individuals, and the Nation due to the potential for unauthorized access, use, disclosure, modification, or destruction of information and or information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a threat vector?

A

It’s the method that an attacker uses to get to a target.
This might be a hacker toolkit,social engineering, physical intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a threat analysis?

A

Threat analysis is used to assess an organization’s security protocols to identify threats, and vulnerabilities, and gather knowledge of a potential attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main objective of cyber threat analysis?

A

To arrive at answers that help create and support counter-intelligence investigations, leading to the elimination of a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the steps in identifying Cyber Security Threat Analysis?

A
  1. Identify all network assets
  2. Collect data from network traffic monitoring
  3. Trigger
  4. Investigation
  5. Response and Resolution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is likelihood and how is it determined?

A

The probability that a potential vulnerability may be exploited by a threat.

it’s determined by analyzing the threat to the Information system concerning the potential vulnerability and the adequacy of the security controls that are in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a vulnerability?

A

A weakness or gap in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

internal vulnerability scan

A

These scan and target your internal corporate network. They can identify vulnerabilities that leave you susceptible to damage once a cyber attacker or piece of malware makes it to the inside. These scans allow you to harden and protect applications and systems that are not typically exposed by external scans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

External vulnerability scan

A

These scans target the areas of your IT environment that are exposed to the external internet or are otherwise not restricted to your internal users or systems. They can include websites, ports, services, networks, systems, and applications that need to be accessed by external users or customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

compliance scans

A

These scan the configuration variables of your system against standard industry baselines like DISA and CIS. Compliance scans can also be customized based on your individual approved system configuration. These scans will highlight any configurations that do not meet industry best practices or your individual configuration baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

credentialed scan

A

A Credentialed scan is a much safer version of the vulnerability scanner. It provides more detailed information than a Non-Credentialed scan. You can also set up the auditing of files and user permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

non-credential scan

A

A Non-Credentialed scan will monitor the network and see any vulnerabilities that an attacker would easily find; we should fix the vulnerabilities found with a Non-Credentialed scan first, as this is what the hacker will see when they enter your network. For example, an administrator runs a Non-Credentialed scan on the network and finds that there are three missing patches. The scan does not provide many details on these missing patches. The administrator installs the missing patches to keep the systems up to date as they can only operate on the information produced for them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

intrusive versus non-intrusive scans

A

Non-intrusive scans simply identify a vulnerability and report on it so you can fix it. Intrusive scans attempt to exploit a vulnerability when it is found. This can highlight the likely risk and impact of a vulnerability, but may also disrupt your operational systems and processes, and cause issues for your employees and customers — so use intrusive scanning with caution