Risk and Controls (Ch. 8,9) Flashcards

1
Q

risk

A

_ likelihood that a threat will exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Inherent risk

A

_ risk that exists prior to using risk management controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Residual risk

A

_ risk that remains after mitigating risk to an acceptable level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control risk

A

_ risks of in-place controls not being sufficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk appetite vs risk tolerance

A

_ risk willing to accept vs ability to withstand risk
_ even accepting security risk can have rewards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AV

A

_ asset value
_ value of an asset to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk control assessment

A

_ evaluates in-place controls against known risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Quantitative risk assessment

A

_ assigns monetary values to risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EF

A

_ risk exposure factor
_ portion of an asset that would be damaged should a risk materialize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SLE

A

_ single loss expectancy
_ loss expected for a particular asset on exposure
_ SLE = AV x EF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARO

A

_ annualized rate of occurrence
_ number of times loss expected to occur in a year (%)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ALE

A

_ annualized loss expectancy
_ loss expected in a year (per asset?)
_ ALE = SLE x ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Qualitative risk assessment

A

_ uses judgment to assess risk probability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

impact

A

_ magnitude of harm resulting from a risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Numerical risk

A

_ probability x impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

KRI

A

_ key risk indicator
_ metrics for monitoring risk associated with an activity, process, or system
_ e.g. security incidents per month
_ e.g. % of overdue security patches
_ e.g. avg. time to detect and respond to a security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk register

A

_ identifies risks
_ indicates likelihood
_ indicates potential impact
_ reports current status
_ assigns risk owners
_ good for prioritizing risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risk matrix

A

_ chart showing likelihood (probability) vs impact of a risk
_ scores the risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Vulnerability scanner

A

Creates a vulnerability report but does not address vulnerabilities (aka “passive”):
_ runs either credentialed (shows what an attacker would see) or non-credentialed (which can provide more detail)
_ lists hosts discovered
_ lists apps running on each host
_ lists open ports and services on each host
_ lists vulnerabilities discovered
_ lists recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Penetration test

A

_ starts with a reconnaissance of vulnerabilities
_ attempts to exploit vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Vulnerability assessment

A

_ identifies assets and capabilities
_ prioritizes assets based on value
_ identifies vulnerabilities and prioritizes them
_ recommends controls to mitigate vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Network scanner

A

_ gathers info about hosts
_ nmap
_ typically one of: ARP ping scan, Syn stealth scan, port scan, service scan, OS detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ARP ping scan

A

_ address resolution protocol ping scan
_ hosts receiving an ARP packet with its IP address responds with a MAC address
_ response tells scanner that host is operational at an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SYN stealth scan

A

_ scanner sends a TCP SYN to start a connection
_ looks for SYN/ACK response to know host is capable of connection
_ sends RST (reset) rather than ACK to end connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Port scan

A

_ checks of open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Service scan

A

_ verifies protocol or service at a port
_ performs a test of the protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

OS detection

A

_ uses TCP/IP fingerprinting to analyze packets and determine OS of host
_ different OSs typically use different TCP window sizes
_ other values also help determine the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CVE

A

_ common vulnerabilities and exposures
_ dictionary of publicly known security vulnerabilities
_ funded by U.S. government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

CVSS

A

_ common vulnerability scoring system
_ assigns vulnerabilities scores of 0 through 10
_ 10 is most severe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Offensive penetration testing

A

_ simulates a real world attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Defensive penetration testing

A

_ evaluates security controls for vulnerabilities
_ e.g. firewall rule analysis, configuration reviews, penetration testing of web apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Integrated penetration testing

A

_ combines physical, offensive, and defensive penetration testing for a comprehensive evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

reconnaissance

A

_ aka footprinting
_ attacker learns as much as possible
_ passive or active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Passive reconnaissance

A

_ collects info using OSINT
_ does not include analyzing or interacting with the targets directly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Active reconnaissance

A

_ uses tools to engage with targets to collect information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Network reconnaissance and discovery

A

Almost always illegal, sans permission. Tools:
_ IP scanner
_ nmap
_ netcat (nc)
_ scanless
_ dnesum
_ nessus
_ hping
_ sn1per
_ curl

37
Q

IP scanner

A

_ aka ping scanner

38
Q

nmap

A

_ identifies active hosts
_ reports IP addresses
_ reports protocols and services running
_ reports OS installed

39
Q

netcat

A

_ nc
_ used for “banner grabbing” to gain info about remote systems
_ can return OS used and info about some apps
_ can transfer files
_ can check for open ports

40
Q

scanless

A

_ does port scans
_ makes scan originate from a website (with or without owner’s permission), hiding the tester’s IP

41
Q

dnsenum

A

_ DNS enumeration
_ lists DNS records for domains

42
Q

nessus

A

_ vulnerability scanner

43
Q

hping

A

_ sends pings using TCP, UDP, or ICMP
_ can scan for open ports on remote systems

44
Q

sn1per

A

_ community edition performs vulnerability assessments
_ professional edition attempts to exploit vulnerabilities

45
Q

Footprinting vs fingerprinting

A

_ network footprinting provides big-picture view of network
_ fingerprinting provides details of systems on network

46
Q

Attacker persistence

A

_ ability to maintain presence in a network for a long time
_ often involves creating a backdoor

47
Q

Lateral movement

A

_ how attackers move in a network
_ once in a network, uses new abilities to attempt to move to other systems of network (called “pivoting”)

48
Q

pivoting

A

_ using an exploited system to target other systems

49
Q

Vulnerability tester classification

A

_ unknown environment testing - testers have no prior knowledge of the environment
_ known environment testing - testers have full prior knowledge of the environment
_ partially known environment testing

50
Q

RD

A

_ responsible disclosure program
_ policies for reporting vulnerabilities
_ e.g. bug bounty

51
Q

tcpreplay

A

_ suite of tools for editing packet captures and sending modified replays

52
Q

tcpdump

A

_ command line tool for capturing packets

53
Q

NetFlow

A

_ common router and switch feature
_ stores and analyzes network header data

54
Q

Gap analysis

A

_ reviewers compare requirements of a standard to an organization’s normal operations

55
Q

attestation

A

_ outcome of an audit
_ formal statement of controls that are in place for security

56
Q

Pressure sensor

A

_ detect changes in pressure on a service or in an area
_ detects walking or forcing doors and windows

57
Q

Microwave sensor

A

_ detects movement by observing reflections of microwaves

58
Q

Ultrasonic sensors

A

_ echo location, measuring distance

59
Q

bollard

A

_ short vertical post of reinforced concrete and steel
_ barricade inhibiting cars

60
Q

Vendor diversity

A

_ implementing security controls from multiple vendors to reduce changes of a single vulnerability allowing access

61
Q

RAID

A

_ redundant array of inexpensive disks

62
Q

RAID-0

A

_ striping
_ no redundancy across disks
_ improves performance by spreading a file across multiple disks

63
Q

RAID-1

A

_ mirroring
_ only redundancy
_ twice as many disks

64
Q

RAID-5

A

_ 3+ disk striped together with parity
_ If one disk goes down, data can be recovered

65
Q

RAID-6

A

_ like RAID-5 but uses an additional disk for additional parity
_ two disk can go down and data still recovered

66
Q

RAID-10

A

_ aka RAID 1+0
_ mirroring and striping
_ 4+ drives
_ requires twice the drive capacity of data stored

67
Q

Source IP address affinity

A

_ ensures load balanced connection goes to same server for duration of a session

68
Q

Load balancing with persistence

A

_ uses source IP address affinity to keep sessions hitting the same backend node

69
Q

active/active vs active/passive load balancers

A

_ active/active distributes load across multiple nodes
_ active/passive changes the receiving node only when the prior receiving node goes down

70
Q

NIC teaming

A

_ combining multiple NICs into one virtual NIC
_ load balances across NICs
_ improves performance and reliability

71
Q

NAS

A

_ networked attached storage
_dedicated computer for file storage

72
Q

SAN

A

_ storage area network
_ block-level data storage
_ high-speed

73
Q

Differential vs incremental backup

A

_ differential backs up all data that changed since last full backup
_ incremental backs up all data that changed since last full or incremental backup

74
Q

journaling

A

_ backup technique
_ records changes to data or files in a log (aka journal)
_ can apply changes given in log for recovery
_ useful in databases and filesystems

75
Q

BCP

A

_ business continuity plan

76
Q

BIA

A

_ business impact analysis
_ part of the BCP
_ identifies mission-essential functions

77
Q

RTO

A

_ recovery time objective
_ max time allowed for restoring system after outage

78
Q

RPO

A

_ recovery point objective
_ period of time over which data loss is acceptable (e.g. just the most recent week)

79
Q

MTBF

A

_ mean time between failures

80
Q

MTTR

A

_ mean time to repair (or recover)

81
Q

COOP

A

_ continuity of operations planning
_ plan for restoring essential functions after outage

82
Q

Recovery site

A

_ sites established for resiliency
_ hot sites, warm sites, and cold sites

83
Q

Hot site

A

_ recovery site that is always operational, ready to go
_ usually takes at least a little time to switch over

84
Q

Cold site

A

_ recovery site that isn’t ready to go but has power and connectivity

85
Q

Warm site

A

_ recovery site that remains partially operational

86
Q

DRP

A

_ disaster recovery plan
_ how to recover critical systems and data
_ a BCP may have multiple DRPs for different disasters

87
Q

Disaster recovery steps

A

_ activate the DRP
_ implement contingencies (e.g. change to a recovery site)
_ recover critical systems
_ test recovered systems
_ after-action report (lessons learned, updated plan)

88
Q

Tabletop exercises

A

_ discussion of hypothetical scenarios to plan for disasters