2.2_ Risk Management and Threat Modeling Flashcards

(37 cards)

1
Q

What’s the difference between a vulnerability, a threat, and a risk?

A

A vulnerability is an aspect of a business that can be exploited to compromise a system’s CIA.

A threat is an actor that might exploit a vulnerability.

A risk is a possibility of losing something valuable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _________ is an aspect of a business that can be exploited to compromise a system’s CIA.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A _________ is an actor that might exploit a vulnerability.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A _________ is a possibility of losing something valuable.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Using the results of risk analysis to create a plan for preventing likely risks is called what?

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Understanding what risks face an organization, which are most severe, and which are most likely is called what?

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Determining which attacks an organization is most likely to experience, who is most likely to launch them, and what actions can be done to prevent them is called what?

A

Threat Modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a business’s primary objective?

A

Profit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____________ and _____________ directly contribute to business profit.

A

Risk analysis and management and threat modeling directly contribute to business profit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____________ helps business understand how much they’ll need to spend in the event of a given security break.

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____________ results are shared upwards to the executives who make the major business decisions.

A

Threat Modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When possible, risks are measured ___________ in financial figures, which businesses use to prioritize threats.

A

Quantitatively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does PASTA stand for?

A

It’s a Threat Modeling Methodology:

Process for Attack Simulation & Threat Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does OWASP stand for?

A

Spoofing, Tampering, Repudiation, Information

Disclosure, DoS (Denial of Service), Elevation of Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the steps involved in the OWASP Threat Modeling process?

A
  1. Determine assessment scope
  2. Identify threat agents
  3. Identify potential attacks
  4. Identify exploitable vulnerabilities
  5. Prioritize identified risks
  6. Mitigate risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is step 1 of the OWASO Threat Modeling process?

A

Determine Scope:

List the assets under consideration, determine their value, and define objectives for your threat modeling assessment.

17
Q

What is step 2 of the OWASO Threat Modeling process?

A

Identify Threat Agents:

Determine which attackers would be interested in the relevant assets.

18
Q

True or false:

Threat agents include a person or group that can produce a threat, whether or not that person or group is malicious.

19
Q

What is step 3 of the OWASO Threat Modeling process?

A

Identify Potential Attacks:

Identify the attacks each agent is likely to perform.

20
Q

_________ attackers use different modes of attacks and _________ attacks mean different risks and _________ considerations.

A

Different attackers use different modes of attacks and different attacks mean different risks and different considerations.

21
Q

If a client’s web application is taken offline by a DoS attack, the severity of the risk depends on which threat agent is responsible. What would be the difference between script kiddies and APTs?

A

Script kiddies might DoS a server simply to cause trouble.

An APT might DoS a server as a smokescreen to steal valuable data.

22
Q

___________ is the process of prioritizing threats identified in steps 1-4 based on their potential impact and likelihood.

A

Risk Analysis

23
Q

___________ is evaluating risk based on intangible, unmeasurable factors.

A

Qualitative Analysis

24
Q

Evaluating each risk based on its measured likelihood and impact is called what?

A

Quantitative Analysis

○ Likelihood: The probability of an event will take place.

○ Impact: The measure of the damage done if a risk takes place.

25
When likelihood and impact cannot be accurately measured, you should do what type of analysis?
Quantitative Analysis
26
_________ is used when a complex evaluation of cost vs. benefit is unnecessary. What's an example?
Qualitative Risk Analysis When a company is deciding between an inexpensive VPN service that logs traffic on its servers for internal use, and a more expensive service that does not keep any logs. A bakery can use qualitative analysis to decide on an inexpensive VPN, since it shouldn’t matter much if they’re logging non-confidential information.
27
You should use a ___________ when circumstances where intuitive analysis is insufficient.
Quantitative Risk Analysis
28
To perform a ____________, analysts start by calculating how much it will cost if an asset is breached.
Quantitative Risk Analysis
29
To perform a quantitative risk analysis, first, quantify _________ and _________.
First, quantify asset value and exposure factor.
30
What does SLE stand for and what is?
Single Loss Expectancy (SLE) SLE = AVE x EF The estimated cost of the risk occurring on a given asset.
31
What does ARO stand for and what is it?
Annual Rate of Occurrence (ARO) Estimated number of times the risk is likely to occur in a given year.
32
What does ALE stand for and what is it?
Annual Loss Expectancy (ALE) Estimated cost of a risk reoccurring in a given year.
33
What do AV and EF stand for
AV = Asset Value EF = Exposure Factor
34
The organization has the resources to respond to the breach immediately, without affecting day-to-day operations or revenue is what loss expectancy category?
Marginal
35
The organization has the resources to respond to the breach, but may not be able to do so immediately. May experience interruptions to operations is what loss expectancy category?
Notable
36
The organization experiences serious interruptions to operations, and doesn’t have the monetary and/or personnel resources to respond to effectively. May have to defer revenue, delay project timelines, reassign employees, and/or hire consultants to address the issue is what loss expectancy category?
Severe
37
The organization suffers severe, lasting damage to its reputation and/or infrastructure. The future of the business is threatened by reputational damage, bankruptcy, being found in contempt of federal regulations, or other issues is what loss expectancy category?
Catastrophic