Section 24: Threat and Vulnerability Management Flashcards
Lockheed Martin Cyber Kill Chain
Lockheed Martin Cyber Kill Chain
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
CC
Action on Objectives
Older model, with a linear approach.
MITRE ATTACK
Iterative Model, made to be less linear and rigid than the Cyber Kill Chain.
Security Content Automation Protocol (SCAP)
Standardizes the formatting and naming conventions used for software flaws, misconfigurations, and vulnerabilities
Open Vulnerability and Assessment Language (OVAL)
An XML schema for describing system security states and querying
vulnerability reports and information
Extensible Configuration Checklist Description Format (XCCDF)
▪ An XML schema for developing and auditing best-practice configuration checklists and rules
▪ With XCCDF, scanning tools and automation can be used to check our systems