Risk Management and Threat Modeling Flashcards

1
Q

Risk Management?

A

A detailed process of identifying potential factors that could damage or disclose data, evaluating them in light of data value and countermeasure cost, and implementing cost-effective solutions to mitigate or reduce risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Primary Goal of risk managment?

A

To reduce risk to an acceptable level, acknowledging that a totally risk-free environment is impossible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset?

A

Anything valuable within an environment needing protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asset Valuation?

A

Assigning a dollar value to an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat?

A

Potential occurrences causing undesirable outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability?

A

Weakness in an asset or lack of safeguard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exposure?

A

Susceptibility to asset loss due to threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk?

A

Likelihood of a threat exploiting a vulnerability to harm an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk formula?

A

Risk = Threat * Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Safeguard/Countermeasure?

A

Measures to reduce vulnerability or protect against threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attack?

A

Exploitation of a vulnerability by a threat agent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Breach?

A

Successful bypass of security mechanisms by a threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk Assessment/Analysis?

A

Quantitative Risk Analysis
Qualitative Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Quantitative Risk Analysis?

A

Produces concrete probability percentages and dollar figures for risk levels, potential loss, cost of countermeasures, and value of safeguards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Qualitative Risk Analysis?

A

Scenario-based, ranking threats on a scale rather than exact dollar figures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Quantitative Risk Analysis Steps?

A

Assign Asset Value (AV)
Calculate Exposure Factor (EF)
Calculate Single Loss Expectancy (SLE) = SLE=AV×EF
Assess Annualized Rate of Occurrence (ARO)
Derive Annualized Loss Expectancy (ALE): ALE=SLE×ARO
Perform Cost/Benefit Analysis of Countermeasures

15
Q

Risk Treatment?

A

Risk Reduction/Mitigation: Actions to lessen risk probability/consequences.
Risk Retention/Acceptance: Accepting the cost of a risk.
Risk Avoidance: Avoiding situations leading to risk exposure.
Risk Transfer/Sharing: Sharing risk burden with another party.

16
Q

Attributes of Adversary Modeling and Security Analysis?

A

-Objectives: Identifying target assets requiring protection.
-Methods: Anticipated attack techniques.
-Capabilities: Resources, skills, knowledge, and opportunities of attackers.
-Funding Level: Influences attacker determination and methods.
-Outsider vs. Insider Attacks: Distinguishes between attacks from outside entities and those with internal access.

17
Q

Adversary Groups?

A

Foreign Intelligence
Cyber-terrorists
Industrial Espionage Agents
Organized Crime
Lesser Criminals and Crackers
Malicious Insiders
Non-malicious Employees

18
Q

Security Evaluation Techniques?

A

-Penetration Testing: External review to verify product/system security.
-Vulnerability Assessment: Identifying design-related vulnerabilities and overlooked threats early in product lifecycle.

19
Q

Threat Modeling?

A

Threat Modeling
Purpose: Identifies threats, threat agents, and attack vectors for the target system.
Approaches:
-Diagram-driven: Visual representation of system components and data flows.
-Attack Trees: Hierarchical diagrams showing ways to achieve attack goals.
-Checklists: Fixed lists of known attacks from past experiences, useful but potentially tedious.

20
Q

STRIDE Model?

A

Spoofing: Impersonation attacks.
Tampering: Unauthorized alterations.
Repudiation: Denying responsibility for actions.
Information Disclosure: Unauthorized data release.
Denial of Service (DoS): Impacting service availability.
Escalation of Privilege: Gaining unauthorized access levels.