Ch8: Using Risk Management Tools Flashcards
Threat
a potential danger
Threat assessment
evaluates potential threats
Environmental threats
include natural threats such as weather events
Manmade threats
any potential dangers from people and can be either malicious or accidental
Internal threats
typically refers to employees within an organization
External threats
any source outside an organization
Handling risk…
It is not possible to eliminate risk, but you can take steps to manage it
An organization can avoid risk by
not providing a service or not participating in a risky activity
Insurance
transfers the risk to another entity
You can mitigate risk by
implementing controls. But when the cost of implementing the controls exceeds the cost of the risk, an organization accepts the remaining (residual) risk
Quantitative risk assessment
uses specific monetary amounts to identify cost and asset values
SLE
Single loss expectancy identifies the amount of each loss
ARO
Annual rate of occurence identifies the number of failures in a year
ALE
Annual loss expectancy identifies the expected annual loss
ALE equation
ALE = SLE x ARO
Qualitative risk assessment
uses judgment to categorize risks based on likelihood of occurrence and impact
Risk register
a comprehensize document listing known information about risks. Typically includes risk scores along with recommended security controls to reduce the risk scores
Supply chain assessment
evaluates everything needed to produce and sell a product. It includes all the raw materials and processes required to create and distribute a finished product
Password crackers
attempt to discover passwords and can identify weak passwords or poorly protected passwords
Network scanners
can detect all the hosts on a network, including the OS and services or protocols running on each host
Wireless scanners
can detect rogue access points on a network and sometimes crack passwords used by access points
Netcat
can be used for banner grabbing on remote systems or to remotely administer systems
Vulnerability scanner
can identify vulnerabilities, misconfigured systems, and the lack of security controls such as up-to-date patches.
Vulnerability scans vs penetration tests
Vulnerability scans are passive and have little impact on a system during a test. Penetration tests are intrusive and can potentially compromise a system