Risk and Controls (Ch. 8,9) Flashcards
risk
_ likelihood that a threat will exploit a vulnerability
Inherent risk
_ risk that exists prior to using risk management controls
Residual risk
_ risk that remains after mitigating risk to an acceptable level
Control risk
_ risks of in-place controls not being sufficient
Risk appetite vs risk tolerance
_ risk willing to accept vs ability to withstand risk
_ even accepting security risk can have rewards
AV
_ asset value
_ value of an asset to the organization
Risk control assessment
_ evaluates in-place controls against known risks
Quantitative risk assessment
_ assigns monetary values to risk
EF
_ risk exposure factor
_ portion of an asset that would be damaged should a risk materialize
SLE
_ single loss expectancy
_ loss expected for a particular asset on exposure
_ SLE = AV x EF
ARO
_ annualized rate of occurrence
_ number of times loss expected to occur in a year (%)
ALE
_ annualized loss expectancy
_ loss expected in a year (per asset?)
_ ALE = SLE x ARO
Qualitative risk assessment
_ uses judgment to assess risk probability
impact
_ magnitude of harm resulting from a risk
Numerical risk
_ probability x impact
KRI
_ key risk indicator
_ metrics for monitoring risk associated with an activity, process, or system
_ e.g. security incidents per month
_ e.g. % of overdue security patches
_ e.g. avg. time to detect and respond to a security incident
Risk register
_ identifies risks
_ indicates likelihood
_ indicates potential impact
_ reports current status
_ assigns risk owners
_ good for prioritizing risks
Risk matrix
_ chart showing likelihood (probability) vs impact of a risk
_ scores the risks
Vulnerability scanner
Creates a vulnerability report but does not address vulnerabilities (aka “passive”):
_ runs either credentialed (shows what an attacker would see) or non-credentialed (which can provide more detail)
_ lists hosts discovered
_ lists apps running on each host
_ lists open ports and services on each host
_ lists vulnerabilities discovered
_ lists recommendations
Penetration test
_ starts with a reconnaissance of vulnerabilities
_ attempts to exploit vulnerabilities
Vulnerability assessment
_ identifies assets and capabilities
_ prioritizes assets based on value
_ identifies vulnerabilities and prioritizes them
_ recommends controls to mitigate vulnerabilities
Network scanner
_ gathers info about hosts
_ nmap
_ typically one of: ARP ping scan, Syn stealth scan, port scan, service scan, OS detection
ARP ping scan
_ address resolution protocol ping scan
_ hosts receiving an ARP packet with its IP address responds with a MAC address
_ response tells scanner that host is operational at an IP address
SYN stealth scan
_ scanner sends a TCP SYN to start a connection
_ looks for SYN/ACK response to know host is capable of connection
_ sends RST (reset) rather than ACK to end connection
Port scan
_ checks of open ports
Service scan
_ verifies protocol or service at a port
_ performs a test of the protocol
OS detection
_ uses TCP/IP fingerprinting to analyze packets and determine OS of host
_ different OSs typically use different TCP window sizes
_ other values also help determine the OS
CVE
_ common vulnerabilities and exposures
_ dictionary of publicly known security vulnerabilities
_ funded by U.S. government
CVSS
_ common vulnerability scoring system
_ assigns vulnerabilities scores of 0 through 10
_ 10 is most severe
Offensive penetration testing
_ simulates a real world attack
Defensive penetration testing
_ evaluates security controls for vulnerabilities
_ e.g. firewall rule analysis, configuration reviews, penetration testing of web apps
Integrated penetration testing
_ combines physical, offensive, and defensive penetration testing for a comprehensive evaluation
reconnaissance
_ aka footprinting
_ attacker learns as much as possible
_ passive or active
Passive reconnaissance
_ collects info using OSINT
_ does not include analyzing or interacting with the targets directly
Active reconnaissance
_ uses tools to engage with targets to collect information