Section C Flashcards

1
Q

NAME 5 TOOLS THAT ARE USED TO IDENTIFY VULNERABILITIES IN A COMPUTER SYSTEM

A

PORT SCANNERS - SCAN A COMPUTER FOR ANY OPEN PORTS THAT MAY BE ABLE TO BE EXPLOITED BY HACKERS

REGISTRY CHECKER - PERFORMS BACKUPS OF THE REGISTRY, MAKING IT EASIER TO RESTORE IT TO A PREVIOUS STATE

WEBSITE VULNERABILITY SCANNERS- SEARCH FOR VULNERABILITIES ON WEBSITES SUCH AS CROSS-SITE SCRIPTING(XSS), SQL INJECTION AND INSECURE SERVER CONFIGURATION

VULNERABILITY DETECTION AND MANAGEMENT SOFTWARE -
SCANNERS FOR VULNERABILITIES ON IT SYSTEMS

ACCESSING USER VULNERABILITIES-
IDENTIFIES ANY VULNERABILITIES THAT MIGHT BE CAUSED BY THOSE USING THE SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT IS PENETRATION TESTING

A

A PENETRATION TEST IS WHEN A CYBER-ATTACK IS SIMULATED AGAINST A COMPUTER SYSTEM OR NETWORK TO IDENTIFY VULNERABILITIES THAT COULD BE EXPLOITED BY A MALICIOUS HACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WHO ARE THE OWASP

A

THEY STAND FOR OPEN WEB APPLICATION SECURITY PROJECT, THEY ARE AN ORGANISATION THAT IDENTIFY COMMON THREATS THAT COULD OCCUR TO A WEB APPLICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT ARE THE TOP 10 RECENT THREATS

A

INJECTION FLAWS -
BROKEN AUTHENTICATION -
SENSITIVE DATA EXPOSURE -
XML EXTERNAL ENTITIES -
BROKEN ACCESS CONTROL -
SECURITY MISCONFIGURATION -
CROSS-SITE SCRIPTING -
INSECURE DESERIALIZATION -
USING COMPONETS WITH KNON VULNERABILITIES
INSUFFICIENT LOGGING AND MONITORING -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT IS A RISK

A

A RISK IS A THREAT THAT COULD RESULT IN SOME FORM OF LOSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT IS THE FIRST STEP IN IDENTIFYING THE SEVERITY OF A RISK FOR EACH THREAT

A

THE FIRST STEP IS TO IDENTIFY IT’S LIKELIHOOD OF OCCURING AND THE IMPACT LEVEL IT COULD CAUSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WHAT ARE THE 3 PROBABILITIES OF THREATS OCCURING

A

UNLIKELY - NOT EXPECTED TO HAPPEN BUT COULD
LIKELY - WILL PROBABLY HAPPEN AND REOCCUR BUT NOT CONSTANTLY
VERY LIKELY - WILL CERTAINLY HAPPEN AND REPEATEDLY AND EVEN FREQUENTLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT ARE THE 3 LEVELS OF IMPACT THAT COULD BE CAUSED

A

MINOR - UNLIKELY THAT MUCH WILL BE LOST BUT THERE MIGHT BE SOME FINANCIAL LOSS
MODERATE - SOMETHING WILL BE LOST AND FINANCIAL DAMAGE WILL HAVE AN IMPACT ON THE ORGANISATN
MAJOR - HIGH AMOUNT OF LOSS WILL BE CAUSED AND FINANICAL DAMAGE IS LIKELY TO BE SUBSTANTIAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WHEN ARE RISK ASSESSMENTS CARRIED OUT

A

THEY SHOULD BE CARRIED OUT DURING THE DESIGN OF A SYSTEM AND AT REGULAR INTERVALS DURING OPERATION IN ORDER TO AUDIT SECURITY PROCESSES. A RISK ASSESSMENT IS ALSO DONE WHEN THERE IS A BREACH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHAT ARE THE 5 STEPS TO PERFORMING A RISK ASSESSMENT

A

IDENTIFY POSSIBLE THREATS
IDENTIFY LIKELIHOOD OF THREATS
ASSESS THE VULNERABILITIES
ASSESS THE IMPACT LEVEL
DETERMINE THE RISK SEVERITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHY IS IT IMPORTANT THAT WE DOCUMENT OUR RISK ASSESSMENT

A

SO THAT WE CAN REFER TO IT LATER WHEN PRODUCING THE SECURITY PLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WHAT STRUCTURE DO YOU FOLLOW WHEN DOCUMENTING A RISK ASSESSMENT

A

YOU MUST FILL IN THE FOLLOWING DETAILS:
THREAT NUMBER
THREAT TITLE
PROBABILITY
IMPACT LEVEL
RISK SEVERITY
EXPLANTION OF THE THREAT IN CONTEXT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT IS THE PURPOSE OF A CYBER SECURITY PURPOSE

A

A CYBER SECURITY PLAN WILL IDENTIFY HOW WE WILL PROTECT OURSELVES FROM BEING AFFECTED BY THE THREATS IDENTIFED IN THE RISK ANALYSIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT ARE 8 HEADINGS WE NEED TO IDENTIFY IN A CYBER SECURITY PLAN

A
  • THREAT ADDRESSED BY THE PROTECTION MEASURE
  • ACTIONS TO BE TAKEN
  • REASONS FOR THE ACTION
  • OVERVIEW OF TECHNICAL AND FINANICAL CONSTRAINTS
  • OVERVIEW OF LEGAL RESPONSIBILITIES
  • OVERVIEW OF USABILITY OF THE SYSTEM
  • OUTLINE COST BENEFIT
  • TEST PLAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly