Domain 1: Threat Modeling Flashcards

1
Q

The security process where potential threats are identified, categorized and analyzed

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Threat modeling that takes place during the early stages of systems development
  • i.e. Initial design
A

Proactive approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Threat modeling that takes place after a product has been created and deployed
  • i.e. pen testing, fuzzing, code review
A

Reactive approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A threat model created by Microsoft to guide threat categorization

A

STRIDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does STRIDE stand for?

A
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service (DoS)
Elevation of privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Seven stage threat modeling methodology aimed at selecting or developing countermeasures in relation to the value of the assets to be protected.

A

Process for Attack Simulation and Threat Analysis (PASTA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat model used to provide a security audit in a reliable and repeatable procedure.

A

Trike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat model that integrates threat and risk management into Agile programing environment on a scalable basis

A

Visual, Agile, and Simple Threat (VAST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Next step in threat modeling determining the threats facing your development project
  • Creating a graph detailing elements involved in the transaction along with indications of data flow and privilege boundaries.
A

Diagramming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the DREAD rating system stand for?

A
Damage potential
Reproducibility
Exploitability
Affected users
Discoverability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The act of intentionally positioning data so that it is not viewable or accessible to an unauthorized subject.

A

Data Hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The idea of not informing a subject about an object being present and hoping the subject will not discover the object.

A

Security through obscurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Long-term plan
  • Defines the organization’s security purpose goals mission and objectives of the organization
  • Useful up to 5 years if maintained and updated annually
A

Strategic Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Midterm plan
  • Provides more details on accomplishing the goals set forth
  • Useful for about a year
  • i.e. hiring, project, and budget plans
A

Tactical Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Short-term plan
  • Provides step-by step detail on plan
  • Updated often monthly or quarterly
  • i.e. staffing assignments, scheduling, step-by-step implementation procedures
A

Operational Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Each participants writes down their response on paper anonymously
  • Results are compiled and presented to group
  • Process is repeated until consensus is reached
  • Qualitative
A

Delphi technique

17
Q
  • A formal evaluation of a security infrastructure’s individual mechanisms against a baseline or reliability expectation
  • Can be performed in addition to or independently to a pen test or vulnerability assessment
A

Security Control Assessment (SCA)

18
Q

When a competitor tries to steal info, and they may use an internal employee

A

Espionage

19
Q

Name the six categories of computer crimes

A
  1. Military and intelligence attack
  2. Business attack
  3. Financial attack
  4. Terrorist attack
  5. Grudge attack
  6. Thrill attack
20
Q

What are the three ways of confiscating evidence?

A
  1. Person who owns the evidence voluntarily surrenders it
  2. Subpoena could be used to compel the subject to surrender it
  3. Search warrant confiscates the evidence without giving the subject opportunity to alter it
21
Q
  • Threat model

- Threats are ranked numerically and categorized

A

DREAD

22
Q

PASTA risk-based threat-model that contains what following 7 stages?

A

Stage 1: Definition of objectives (DO) for the Analysis of Risks
Stage 2: Definition of the Technical Scope (DTS)
Stage 3: Application Decomposition and Analysis (ADA)
Stage 4: Threat Analysis (TA)
Stage 5: Weakness and Vulnerability Analysis (WVA)
Stage 6: Attack Modeling & Simulation (AMS)
Stage 7: Risk Analysis & Management (RAM)

23
Q
  • Two-dimensional model that uses six basic communication interrogatives (What, How, Where, Who, When and Why) and intersects them with different enterprise audiences (Executives, Business - Managers, System Architects, Engineers, Technicians, and Enterprise-wide)
  • Framework is not security orientated
  • Offers understanding of an enterprise in a modular table
A

Zachman Architecture Framework

24
Q

Name the 4 architecture types The Open Group Architecture Framework (TOGAF) is used to develop?

A
  1. Business architecture
  2. Data architecture
  3. Applications architecture
  4. Technology architecture
25
Q

Framework used by an architect to understand the enterprise from different views (i.e. business, data, applications, and technology) and implements the necessary technology controls to work within the environment.

A

The Open Group Architecture Framework (TOGAF)

26
Q

US based military architecture framework

A

Department of Defense Architecture Framework (DoDAF)

27
Q

British based military architecture framework

A

Ministry of Defense Architecture Framework (MODAF)

28
Q

Two dimensional model (similar to Zachman Framework) for enterprise security architecture and service management

A

Sherwood Applied Business Security Architecture (SABSA)

29
Q
  • Process improvement methodology

- Uses statistical methods of measuring operational efficiency and reducing variation, defects, and waste.

A

Six Sigma