Week 6-2 Flashcards

1
Q

List the first 3 common ways to identify threats/vulnerabilities.

A
  • CVE (Common Vulnerabilities & Exposures)
  • NVD (National Vulnerability Database)
  • CWE (Common Weakness Enumeration)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the second 3 common ways to identify threats/vulnerabilities.

A
  • CAPEC (Common Attack Pattern and Enumeration Classification)
  • CPE (Common Platform Enumeration)
  • CCE (Common Configuration Enumeration)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the qualification criteria for a CVE?

A
  • Fixable Independent of other issues
  • Vendor Acknowledgment
  • Proven risk
  • Affecting one codebase
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Base Metrics: What are the exploitability metrics?

A
  • Attack Vector (AV)
  • Attack Complexity (AC)
  • Attack Requirements (AT)
  • Privileges Required (PR)
  • User Interaction (UI)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does it mean when we refer to “impact” metrics in CVSS?

A

Vulnerable System Impact and Subsequent System Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What impact metrics are measured in CVSS?

A
  • Confidentiality (VC/SC)
  • Integrity (VI/SI)
  • Availability (VA/SA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are environmental metrics in CVSS?

A
  • Confidentiality, Integrity, and Availability Requirements (CR, IR, AR)
  • Modified Attack Vector (MAV)
  • Modified Attack Complexity (MAC)
  • Modified Attack Requirements (MAT)
  • Modified Privileges Required (MPR)
  • Modified User Interaction (MUI)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly