4.0 - Vulnerability Assessment and Risk Management Flashcards

(38 cards)

1
Q

What three elements need to exist in order for there to be risk?

A

An asset, a vulnerability, and a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is risk?

A

Potential loss of CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do tools like Nessus or Open VAS do?

A

They’re vulnerability scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CVSS stands for…

A

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In CVSS, a higher number means ____.

A

riskier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define “true positive.”

A

A vulnerability exists and was detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define “true negative.”

A

No vulnerability exists and none were detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define “false positive.”

A

No vulnerability exists yet one was mistakenly detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define “false negative.”

A

A vulnerability exists but was not detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Qualitative risk analysis matches _____ to ______.

A

Likelihood to impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SLE?

A

Single Loss Expectancy - the financial cost of a risk being realized

P. 230

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ARO?

A

Annualized Rate of Occurrence - how many losses are expected this year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ALE?

A

Annualized Loss Expectancy - financial impact over a year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the basic quantitative analysis equation?

A

SLE x ARO = ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three data states?

A

Data at rest, data in motion, data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four risk management strategies?

A

Mitigation, Avoidance, Transference, Acceptance

17
Q

What are the four controls in risk mitigation?

A

Preventive, detective, corrective, deterrent

18
Q

What are the three categories of threat intelligence?

A

Tactical, Operational, and Strategic Intelligence

19
Q

Name two vulnerability databases.

A

Common Vulnerabilities and Exposures (CVE)
National Vulnerability Database (NVD)

20
Q

What are the four CVSS exploitability metrics?

A

Attack Vector
Attack Complexity
Privileges Required
User Interaction

21
Q

What are the three CVSS impact metrics?

A

Data disclosure (Confidentiality)
Data alteration (Integrity)
Downtime or data loss (Availability)

22
Q

What is SCAP?

A

Security Content Automation Protocol, a vulnerability assessment tool.

23
Q

What is STIX?

A

Structured Threat Information Expression - threat intelligence expressed in JSON format

24
Q

What is TAXII?

A

Trusted Automated eXchange of Intelligence Information - the HTTPS-based method for transferring STIX information.

25
What is an ISAC?
Information Sharing and Analysis Center, industry-specific groups which share threat information
26
What are three categories of disaster recovery controls?
Detective, preventive, and corrective
27
What is the 3-2-1 rule?
Three copies of data, on two types of media, one stored off-site
28
What are the three phases of business impact analysis?
1) Identify critical business processes and the resources they rely on 2) Determine impact and maximum acceptable disruption for each critical resource 3) Proritize the recovery order
29
What is the recovery time objective (RTO)?
The maximum time that business can be disrupted
30
What is the recovery point objective (RPO)?
The amount of data loss that can be acceptable to the business
31
DRP stands for...
Disaster Recovery Plan
32
BCP stands for...
Business Continuity Plan
33
BIA stands for...
Business Impact Analysis
34
What are the three phases of BCP?
1) perform BIA 2) develop BCP 3) test and maintain BCP
35
What is a checklist exercise?
Where stakeholders go through the BCP and look for any glaring omissions.
36
What is a tabletop exercise?
Team members are presented with a fictional scenario and talk through how they would handle it.
37
What is a partial simulation?
A fictional scenario involving a subset of an org's systems and personnel
38
What is a full simulation?
Testing the BCP with all systems and personnel.