Section 1 Risk Management Flashcards

1
Q

What is the CIA of security?

A

Confidentiality, Integrity, Availability.

Don’t forget - auditing, accountability & non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is non-repudiation?

A

It’s when a user cannot deny having done a particular action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 5 attributes of threat actors?

A
Internal/external
Level of sophistication
Resources/funding
Intent
Open Source Intelligence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is OSINT?

A

Open Source Intelligence. It provides ample info to intrigue a threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Script Kiddy threat actor?

A

Trivial knowledge
Uses scripts
Lock picker
Blocked by firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Hacktivist?

A

A threat actor whose Intent is powered by motivation. So consider their goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is organized crime a threat actor?

A

Motivation is to make money!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is a Nation State a threat actor? And what does APT stand for?

A

Motivation is intelligence.

They are Advanced Persistent Threats. Tonnes of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are “insiders” a threat actor?

A

They are anyone with access e.g. Have a userName + PW

  • vendors
  • contractors
  • cleaning crews
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give some examples of assets that are at risk

A

Any part of infrastructure - computers, people, servers, company reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give some examples of risk vulnerabilities

A

Unlocked server room, default PWs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give some examples of threats

A

Threats are actions. (The person involved in the threat is a threat agent.)

E.g. - Someone able to access a server room.
- Someone critical to the team quits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a threat?

A

A threat is a discovered action that exploits a vulnerability’s potential to do harm to an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a threat agent?

A

Usually a person who initiates a threat. (But could be something like a hurricane!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is likelihood when related to risk and threats?

A

Often depicted as a % and for a year timespan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two ways risk likelihood is measured?

A

Quantitative and Qualitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Give an example of quantitative likelihood risk

A

Router with a power supply - there’s a risk it might die. Something measurable - time, cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Give an example of qualitative likelihood risk

A

Harder to measure - customer loyalty. “Low Med, High”

19
Q

What is impact?

A

The actual harm caused by a threat,

20
Q

What is the formula to calculate risk?

A

threats x vulnerabilities = risk

or

threats -> vulnerabilities = risk

21
Q

What is the NIST SP 800-30?

A

National Institute of Standards and Technologies Document that lists all possible threats and vulnerabilities to assess risks.

22
Q

What are the two risk assessment steps?

A
  • Vulnerability Assessment

- Threat Assessment

23
Q

What is the “CVE” on cve.mitre.org?

A

“Common Vulnerabilities and Exposures” database. Used to assess risk - very detailed.

24
Q

What is Nessus?

A

The Nessus is a program that is ran locally and generates data for any vulnerabilities it finds.

25
Q

What is Pen testing?

A

Penetration Testing is when an outside party looks for vulnerabilities in your network. It’s the best way to find any problems.

26
Q

Give an example of Adversarial threats

A

Hacker, malware

27
Q

Give an example of Accidental threats

A

User mistakenly enters text and drops the db.

28
Q

Give an example of Structural threats

A

Power supply issues, equipment failure

29
Q

Give an example of Environmental threats

A

Fires, AC, earthquakes

30
Q

What is mitigation when related to risk response?

A

Mitigation is effort to reduce impact of risk.

31
Q

What is risk transference?

A

When you offload risk to a 3rd party - e.. use a cloud based web server - you no longer have to worry about power supply etc.

32
Q

What is risk acceptance?

A

When costs to mitigate are too high, so you accept the risk - e.g. a meteor could hit your servers.

33
Q

What is risk avoidance?

A

The decision to not store sensitive info, where you could be liable.

34
Q

Name two Risk Management Frameworks

A

NIST Risk Management Framework Special Publication 800-37

ISACA Risk IT Framework

35
Q

What are the four types of threats?

A
  • Adversarial
  • Accidental
  • Structural
  • Environmental
36
Q

Explain the 5 security control functions

A

Deterrent - deters the actor from attempting
Preventative - deters the actor from performing the threat
Detective - recognizes an actor’s threat
Corrective - mitigates the impact of a manifested threat
Compensating - provides alternative fixes to any of the above!

37
Q

Name the 3 types of security controls

A

Administrative or Management control - laws, policies
Technical controls - firewalls, passwords
Physical Controls - fences, keys, guards

38
Q

List 5 curious security controls

A

Mandatory vacation - (detect weird things happening)
Job Rotation
Separation of Duties (administrative control - Single Resp)
Multi-person control - (2 keys for missile launch!)
Principle of least privilege (Need to know)

39
Q

What is the difference between diversity and redundancy?

A

Redundancy is repeating the same controls at various intervals, diversity is using a variety of controls in a random pattern.

Many trenches (redundant)
or
1 trench, a fence, a catapult, moat etc (diverse)

40
Q

What is “defense in depth”?

A

A security defense that uses all three types of controls - administrative, physical and technical controls.

41
Q

What is vendor diversity?

A

A method of defense in depth with technical controls.

42
Q

What is Security Governance?

A

The bunch of rules an organization operates by.

43
Q

What laws/standards affect IT security?

A

HIPAA (law)
NIST (standard)
PCI-DSS (Credit card standards)