Threat Analysis and Risk Assessment Flashcards

1
Q

Risk

A

The possibility of something bad/unpleasant/dangerous happening

Risk = Likelihood × Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Generic Risk Assessment Process

A

1 Risk Identification
2 Risk Analysis (Likelihood and Impact)
3 Risk Evaluation (Risk level)
4 Risk Treatment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TARA Process Overview

A

Asset identification
Impact rating
Threat enumeration
Attack path analysis
Attack feasibility rating
Risk determination
Risk treatment decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Impact Rating

A

Safety | Finance | Operational | Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat Enumeration

A

Brainstorm-based methods
misuse-case
STRIDE
a combination of the above

Threat scenario can include:
the targeted asset
the compromised cybersecurity property

the action to accomplish a damage scenario
One damage scenario can correspond to multiple threat scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attack path analysis

A

The threat scenarios shall be analyzed to describe possible attack paths

There are different Methods for determining attack paths
* Top-down approaches (e.g. Attack Trees)
* Bottom-up approaches
* A combination of these approaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack feasibility rating

A

Ratings for attack feasibility:

High: easy or almost certain to accomplish the attack path.

Medium: feasible and not unusual to accomplish the attack path.

Low: feasible to accomplish the attack path.

Very low: difficult or almost never possible to accomplish the attack path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attack potential-based approach

A

elapsed time: from identifying a weakness to developing and a successful exploitation.

expertise: attacker’s capabilities including skill and experience.

equipment: attacker’s tools necessary to perform the attack.

knowledge of the item or component: attacker’s knowledge the target.

window of opportunity: the likelihood to perform an attack combing access nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Treatment

A

Avoiding the risk
Reducing the risk
Sharing or transferring the risk
Accepting or retaining the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly