Section 22.209 Vulnerability Management: & Identifying Vulnerabilities Flashcards

Objective 4.3 Explain various activities associated with vulnerability management

1
Q

Vulnerability Management

A

Systematic process for identifying, evaluating, prioritising, and mitigating vulnerabilities

Goals:

Maintain secure and resilient cybersecurity posture, minimize security breaches, and manage risk effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identifying Vulnerabilities

A

Systematic practice of recognising and categorising weaknesses in systems, networks, or applications that could be exploited

■ This process is crucial for enhancing system security, preventing unauthorised access, and protecting the integrity of an organizations data and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Methods for Identifying Vulnerabilities

Vulnerability Scanning

A

Automated probing of systems, networks, and applications to discover potential vulnerabilities

● Tools like Nessus and OpenVAS are used to analyse the current state of systems against a database of known vulnerabilities and output a detailed report

● Prioritise identified vulnerabilities, apply patches, and implement mitigation measures to prevent exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Methods for Identifying Vulnerabilities

Application Security

A

Protecting software from manipulation during its lifecycle

● Techniques include static analysis, dynamic analysis, and package
monitoring for custom software applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Methods for Identifying Vulnerabilities: Application Security

Static Analysis

A

Examines the source code without execution to identify
vulnerabilities

Manual review
Aurtomated tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Methods for Identifying Vulnerabilities: Application Security

Dynamic Analysis

A

Evaluates applications in real-time to detect
vulnerabilities

OWASP ZAP
Burp Suite
Peach Fuzzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Methods for Identifying Vulnerabilities: Application Security

Package Monitoring

A

ensures the security and updates of libraries and components that the applications depend on aresecure and up to date

Snyk
Dependabot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Methods for Identifying Vulnerabilities

Penetration Testing

A

Simulates real-world attacks on systems to evaluate their security

● Examining penetration test results to understand how systems were
infiltrated or exploited

● Mitigate identified issues to prevent similar attack vectors from being
used by attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Methods for Identifying Vulnerabilities

System and Process Audits

A

Comprehensive reviews of information systems, security policies, and procedures

● Ensures adherence to security best practices and industry standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Four-Step Process for Identifying Vulnerabilities

Testing

A

Evaluate patches and updates in a controlled environment before deploying them across the entire enterprise network

● Verify that solutions to mitigate vulnerabilities do not introduce new issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Four-Step Process for Identifying Vulnerabilities

Planning

A

Establish policies, procedures, and mechanisms to systematically track and evaluate vulnerabilities

● Determine how vulnerability testing will be conducted and fixes deployed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Four-Step Process for Identifying Vulnerabilities

Implementation

A

Deploy patches and updates across devices and applications

● Applies to small and large networks to mitigate identified vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Four-Step Process for Identifying Vulnerabilities

Auditing

A

Ensure that security patches and configuration changes have been
implemented effectively

● Verify that no issues have arisen after the implementation of changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly