Scor Information Security concepts Flashcards

1
Q

These controls are aimed at preventing the threat from encountering the vulnerability. Examples are firewalls, physical locks, and security policies.

A

Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

These controls identify that the threat has entered the network or system. Examples are log monitoring and correlation, IPSs, and surveillance cameras. Note that by detecting a threat with IPS, it is also detective.

A

detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These controls are aimed at mitigating or lessening the effects of the threat that is manifested. Examples are virus cleaning procedures or IPS signature updates after a worm outbreak.

A

corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These controls are aimed at putting a system back into production after an incident. Most disaster recovery activities fall into this category, although it is often considered a subset of corrective controls.

A

Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These controls are aimed at discouraging security violations. These controls can be seen as a subset of preventive controls. Examples are signage (“Keep Out” type visuals and policies) or the mere presence of controls such as surveillance cameras.

A

Deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CVSS

A

Common vulnerabilities scoring system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you calculate risk ?

A

Threats x Vulnerabilities x Impact = Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Threat source ?

A

The intent and method that intentional exploits a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Threat ?

A

A threat is the potential for a threat source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Impact ?

A

Impact is the damage that is caused by the threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Quantitative risk assessment ?

A

Quantitative risk assessment involves trying to map a dollar amount to each specific risk,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

qualitative risk assessment ?

A

involves assigning a risk level such as low, medium, or high to each specific risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is business risk ?

A

Business rick is varys but is the risk that a business incurs merely as part of doing business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Data Risk ?

A

the risk of corruption or disclosure of important company data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Systems risk ?

A

The likelihood that a company information system is not adequately protected from damage, loss, or compromise. An example is a company storing important files in a room prone to flooding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The process that balances the operational and economic costs of protective measures and the achieved gains in mission capability by protecting the IT systems and data that support their organizations’ missions.

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a common option when the cost of other risk management options such as avoidance may outweigh the cost of the risk itself.

A

Risk acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

the action that avoids any exposure to the risk. Risk avoidance is usually the most expensive risk mitigation option.

A

Risk avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

limits a company’s risk exposure by taking some action. It is a strategy employing a bit of risk acceptance along with a bit of risk avoidance. It is the most used risk mitigation strategy.

A

Risk limitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the transference of risk to a willing third party (for example, an insurance company).

A

Risk transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If an engineering server’s risk of being hacked is assigned a risk level of very high, which assessment strategy is being used?

quantitative

qualitative

impact

discretionary

non-discretionary

Mandatory

A

qualitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Risk is a function of which three factors? (Choose three.)

threat

cost of security solution

vulnerabilities

impact

deployment time

support costs

A

Threat
Vulnerabilities
Impact

23
Q

What are the steps performend during the Vulnerability assessment process ?

A

Device discovery
Service enumeration
Scanning
Validation

24
Q

CVSS Base metrics is composed of two sets of metrics, what are they

A

Exploitability metrics and Impact metrics

25
Q

What are the Exploitability metrics that fall under the CVSS base metric ?

A

Attack Vector (AV)
Attack complexity (AC)
Privileges Required (PR)
User interaction (UI)
Scope (S)

26
Q

What are the Impact metrics that fall under the CVSS base metric ?

A

Confidentiality impact
Integrity impact
Availability impact

27
Q

What is AV ?

A

This metric reflects the contrext by which vulnerability exploitation is possible.

28
Q

What are all the vulnerable components in AV ?

A

Local
Adjacent
Network
Physical

29
Q

what is the AV vulnerable component that best matches

Exploiting the vulnerability requires either physical access to the target or a local (shell) account on the target.

A

Local

30
Q

what is the AV vulnerable component that best matches

Exploiting the vulnerability requires access to the local network of the target and cannot be performed across an OSI Layer 3 boundary.

A

Adjacent

31
Q

what is the AV vulnerable component that best matches

The vulnerability is exploitable from remote networks. Such a vulnerability is often termed “remotely exploitable,” and can be thought of as an attack being exploitable one or more network hops away, such as across Layer 3 boundaries from routers.

A

Network

32
Q

what is the AV vulnerable component that best matches

A vulnerability exploitable with physical access requires the attacker to physically touch and manipulate the vulnerable component.

A

Physical

33
Q

What is AC

A

Attack complexity, This metric describes the conditions beyond the attacker’s control that must exist to exploit the vulnerability.

34
Q

What are the metrics that fall under AC and describe them

A

Low: Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success against the vulnerable component.

High: A successful attack depends on conditions beyond the attacker’s control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected.

35
Q

What is PR ?

A

Privileges Required, This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability,

36
Q

What are the diffrerent PR metrics and describe them

A

None: The attacker is unauthorized before attack, and therefore does not require any access to settings or files to carry out an attack.

Low: The attacker is authorized with privileges that provide basic user capabilities that could normally affect only settings and files that are owned by a user. Alternatively, an attacker with low privileges may have the ability to cause an impact only to non-sensitive resources only.

High: The attacker is authorized with privileges that provide significant (for example, administrative) control over the vulnerable component that could affect component-wide settings and files.

37
Q

What is UI ?

A

User interaction, this metric indicates whether a user other than the attacker must participate for the exploitation of a vulnerability to succeed

38
Q

What are the different UI metrics ? and describe them

A

None: The vulnerable system can be exploited without interaction from any user.

Required: Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited.

This is like a user opening up a corroupt file

39
Q

what is base metric Scrope (S) ?

A

Scope, An important property that is captured by CVSS is the ability for a vulnerability in one software component to impact resources beyond its means, or privileges.

40
Q

what are the different metrics that fall under Scrop or (S) ? and describe them

A

Unchanged: An exploited vulnerability can only affect resources that are managed by the same authority. In this case, the vulnerable component and the impacted component are the same.

Changed: An exploited vulnerability can affect resources beyond the authorization privileges that are intended by the vulnerable component. In this case, the vulnerable component and the impacted component are different.

41
Q

What is the organizational benefit of incorporating CVSS into risk analysis?

It gives insight into the result of a compromise or attack.

It lowers the threat to detection time.

It is a structured method to assist with prioritizing a vulnerability response.

It makes the engineer read more information than they would have on their own.

A

It is a structured method to assist with prioritizing a vulnerability response.

42
Q

What three factors contribute to a CVSS score? (Choose three.)

performance

confidentiality

privileges

reliability

availability

A

Availability
privileges
confidentiality

43
Q

What is confidentiality impact ?

A

This metric measures the impact to the confidentiality of the information resources that are managed by a software component due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, preventing access by, or disclosure to, unauthorized ones.

44
Q

What is intergrity impact ?

A

This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.

45
Q

What is availability impact ?

A

This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. While the confidentiality and integrity impact metrics apply to the loss of confidentiality or integrity of data such as information and files used by the impacted component, this metric refers to the loss of availability of the impacted component itself, such as a networked service such as web, database, and email. Because availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of an impacted component.

46
Q

What is CVSS temporal metrics ?

A

temporal metrics measure the current state of exploit techniques or code availability, the existence of any patches or workarounds, or the confidence that one has in the description of a vulnerability.

47
Q

What metrics fall under the temporal metrics ?

A

Exploit code maturity
Remediation level (RL)
Report confidence (RC)

48
Q

What is CVSS Environmental metrics ?

A

environmental metrics enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user’s organization, which are measured in terms of complementary/alternative security controls in place: Confidentiality, Integrity, and Availability.

49
Q

What metrics fall under Environmental metrics ?

A

Security Requirements (CR, IR, AR)
Modified Base Metrics

50
Q
A
51
Q
A
52
Q
A
53
Q
A
54
Q
A