cybersecurity Flashcards
(143 cards)
Remember that before any assessment
you should define the scope of the project. the scope include what is included in the assessment
In the scope always remember to
What are the four parts in defining the scope?
- Identify Requirement
- Specify which devices are involved.
- select method of collecting data.
- documentation.
Key Component of Project scope include
- System description
- System architecture diagram
- network Diagram
- Asset inventory
- criticality assessment
- Documentation of data flow.
Remember! complete and detailed scope leads to more valuable assessment.
Why conduct CVA
CVA meant to identify, classify, and define security Vulnerabilities. this is very critical step into in evaluating CYBER RISK!
CVA includes
- Critical step into evaluating cyber risk!
-Evaluating the IACS design, implementation, configuration, implementation, and management, - Determine the adequacy of security measure and identify deficiencies.
When selecting an assessment type
Be aware of cost and Risk to the system. Also consider the benefits gained when running assessment.
Remember that
Those are Cybersecurity Vulnerability Assessment types
- Gap assessment least invasive and provide and it provide comparison to standards, it involves interviews, peers, site walk.
- Passive is used for reviewing arp tables, packet captures,
- Active uses tools to scan network and ports.
- Pen test include it exploit known and unknown vuln.
Benefit of cyber security risk assessment
- Determine order of priority and what needs to be processed first.
- Define threats, Vulnerability and consequences, - this is time consuming and it involves subject natter experts. this will help us to determine countermeasures.
- Design and apply counter countermeasures to reduce risk.
- prioritize of activity and resources.
- evaluate countermeasure for effectiveness vs complexity.
- ROI is also important. is the Assessment worth our time?
Cybersecurity Risk assessment process 62443-3-2
- System under consideration. Section 4.1
- High level risk assessment Section 4.2 * Involve safety teams. * this level will determine the Security Level target where you want to be.
- partition into zones and conduits Section 4.3
- perform detailed risk assessment for each zone and conduit Section 5.0
- Document Security Requirement Assumption. * CRS document. Section 4.4
Detailed risk assessment process. Section 5.0 under IEC62443-3-2
as per the standard it is defined under section 5-
the standard explain the input which is the requirement for each zone and conduit. the middle is the requirement and the output is the results.
the list is
5.1 identify threat
5.2 identify vulnerabilities
5.3 determine consequences and impact.
5.4 determine likelihood.
5.5 calculate unmitigated cyber security risk
5.6 determine security level target.
5.7 consider exaiting countermeasures,
5.8 reevaluate likelihood and impact
5.9 calculate residual risk
5.10 all risk mitigated or below tolerable risk.
5.11 apply additional cybersecurity measure.
5.12 document results
Documentation
You need to document to prove what you did.
Document should be:
- Revised,
- Amended,
- Reviewed and,
- Approved.
Document should be under controlled Scheme.
You need to document all the reports. Documents include
Documents in general provide support, findings, and recommendations.
- Gap assessment reports
- Vulnerability reports
- Risk assessment Reports.
- Zone and conduit diagrams.
- CRS document.
Difference between Vulnerability Assessment and Penetration Testing
VA include identify, classify, and define weaknesses and report on discoveries.
PEN test include exploit to gain access.
Which key concept in the scope details all the element of the system?
Asset Inventory
Why partition the system under consideration into zones and conduits?
To ensure best possible protection.
Chapter 2 Conceptual Design
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
- Learn about the CRRF
- Identify the four T’s of managing risk
- Explain the 5 D’s of treating risk?
- Explain the elements of developing a security strategy
- Develop Cyber security plan.
Conceptual Design have key components that needs to be address so you can provide conceptual design specifications. those key components are
1 - Interpret risk assessment results.
2 - Mitigate results 4Ts or mitigating risk using the 4T’s
3 - Treat Risk using the 5Ds
4 - Develop Security Strategy
5 - Prepare conceptual design specification.
Lets dive to each one.
1- Interpreting Risk assessment Results- this includes. this should be included in any good risk risk assessment. if those are addressed correctly in the Risk assessment then things will be easier.
- Risk Profile
- Highest Severity Consequences.
- Threat/Vuln leading to the highest risk. * This step require a lot of research.
- Target Security Levels.
Recommendation.
SL-T should be established for each zone. this depends on CRRF. it is based on risk matrix and risk tolerance.
Risk Profile is?
it is like a heat map that shows unmittigated risk and the risk level. some companies may have this in place or needs to build one.
SL-T is defined in how many levels?
5 levels.
Level 0 - no requirement
Level 1 - Protection against casual
Level 2 - Protection against intentional with low resource
Level 3 - Protection again intentional with high skills and moderate skills
Level 4 - Protection against intentional attacks with high skills and high motivation.
Security Level Target (SL-T) should be provided for each zone and conduit. also remember that
SL-T depends directly on CRRF the risk reduction Factor.
CRRF
is a measure of the degree of acceptable level. or the risk reduction required to achieve tolerable risk.
CRRF = to unmitigated risk / tolerable risk
You need to establish a relation between the SLT- and the CRRF. this should be based upon
Organization Risk Matrix and Risk tolerance.
Security Level targets are explained under
Annex A of IEC62443-3-3 Security Level Vectors.