Risk and Controls (Ch. 8,9) Flashcards

(88 cards)

1
Q

risk

A

_ likelihood that a threat will exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Inherent risk

A

_ risk that exists prior to using risk management controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Residual risk

A

_ risk that remains after mitigating risk to an acceptable level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control risk

A

_ risks of in-place controls not being sufficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk appetite vs risk tolerance

A

_ risk willing to accept vs ability to withstand risk
_ even accepting security risk can have rewards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AV

A

_ asset value
_ value of an asset to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk control assessment

A

_ evaluates in-place controls against known risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Quantitative risk assessment

A

_ assigns monetary values to risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EF

A

_ risk exposure factor
_ portion of an asset that would be damaged should a risk materialize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SLE

A

_ single loss expectancy
_ loss expected for a particular asset on exposure
_ SLE = AV x EF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARO

A

_ annualized rate of occurrence
_ number of times loss expected to occur in a year (%)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ALE

A

_ annualized loss expectancy
_ loss expected in a year (per asset?)
_ ALE = SLE x ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Qualitative risk assessment

A

_ uses judgment to assess risk probability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

impact

A

_ magnitude of harm resulting from a risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Numerical risk

A

_ probability x impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

KRI

A

_ key risk indicator
_ metrics for monitoring risk associated with an activity, process, or system
_ e.g. security incidents per month
_ e.g. % of overdue security patches
_ e.g. avg. time to detect and respond to a security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk register

A

_ identifies risks
_ indicates likelihood
_ indicates potential impact
_ reports current status
_ assigns risk owners
_ good for prioritizing risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risk matrix

A

_ chart showing likelihood (probability) vs impact of a risk
_ scores the risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Vulnerability scanner

A

Creates a vulnerability report but does not address vulnerabilities (aka “passive”):
_ runs either credentialed (shows what an attacker would see) or non-credentialed (which can provide more detail)
_ lists hosts discovered
_ lists apps running on each host
_ lists open ports and services on each host
_ lists vulnerabilities discovered
_ lists recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Penetration test

A

_ starts with a reconnaissance of vulnerabilities
_ attempts to exploit vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Vulnerability assessment

A

_ identifies assets and capabilities
_ prioritizes assets based on value
_ identifies vulnerabilities and prioritizes them
_ recommends controls to mitigate vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Network scanner

A

_ gathers info about hosts
_ nmap
_ typically one of: ARP ping scan, Syn stealth scan, port scan, service scan, OS detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ARP ping scan

A

_ address resolution protocol ping scan
_ hosts receiving an ARP packet with its IP address responds with a MAC address
_ response tells scanner that host is operational at an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SYN stealth scan

A

_ scanner sends a TCP SYN to start a connection
_ looks for SYN/ACK response to know host is capable of connection
_ sends RST (reset) rather than ACK to end connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Port scan
_ checks of open ports
26
Service scan
_ verifies protocol or service at a port _ performs a test of the protocol
27
OS detection
_ uses TCP/IP fingerprinting to analyze packets and determine OS of host _ different OSs typically use different TCP window sizes _ other values also help determine the OS
28
CVE
_ common vulnerabilities and exposures _ dictionary of publicly known security vulnerabilities _ funded by U.S. government
29
CVSS
_ common vulnerability scoring system _ assigns vulnerabilities scores of 0 through 10 _ 10 is most severe
30
Offensive penetration testing
_ simulates a real world attack
31
Defensive penetration testing
_ evaluates security controls for vulnerabilities _ e.g. firewall rule analysis, configuration reviews, penetration testing of web apps
32
Integrated penetration testing
_ combines physical, offensive, and defensive penetration testing for a comprehensive evaluation
33
reconnaissance
_ aka footprinting _ attacker learns as much as possible _ passive or active
34
Passive reconnaissance
_ collects info using OSINT _ does not include analyzing or interacting with the targets directly
35
Active reconnaissance
_ uses tools to engage with targets to collect information
36
Network reconnaissance and discovery
Almost always illegal, sans permission. Tools: _ IP scanner _ nmap _ netcat (nc) _ scanless _ dnesum _ nessus _ hping _ sn1per _ curl
37
IP scanner
_ aka ping scanner
38
nmap
_ identifies active hosts _ reports IP addresses _ reports protocols and services running _ reports OS installed
39
netcat
_ nc _ used for “banner grabbing” to gain info about remote systems _ can return OS used and info about some apps _ can transfer files _ can check for open ports
40
scanless
_ does port scans _ makes scan originate from a website (with or without owner’s permission), hiding the tester’s IP
41
dnsenum
_ DNS enumeration _ lists DNS records for domains
42
nessus
_ vulnerability scanner
43
hping
_ sends pings using TCP, UDP, or ICMP _ can scan for open ports on remote systems
44
sn1per
_ community edition performs vulnerability assessments _ professional edition attempts to exploit vulnerabilities
45
Footprinting vs fingerprinting
_ network footprinting provides big-picture view of network _ fingerprinting provides details of systems on network
46
Attacker persistence
_ ability to maintain presence in a network for a long time _ often involves creating a backdoor
47
Lateral movement
_ how attackers move in a network _ once in a network, uses new abilities to attempt to move to other systems of network (called “pivoting”)
48
pivoting
_ using an exploited system to target other systems
49
Vulnerability tester classification
_ unknown environment testing - testers have no prior knowledge of the environment _ known environment testing - testers have full prior knowledge of the environment _ partially known environment testing
50
RD
_ responsible disclosure program _ policies for reporting vulnerabilities _ e.g. bug bounty
51
tcpreplay
_ suite of tools for editing packet captures and sending modified replays
52
tcpdump
_ command line tool for capturing packets
53
NetFlow
_ common router and switch feature _ stores and analyzes network header data
54
Gap analysis
_ reviewers compare requirements of a standard to an organization’s normal operations
55
attestation
_ outcome of an audit _ formal statement of controls that are in place for security
56
Pressure sensor
_ detect changes in pressure on a service or in an area _ detects walking or forcing doors and windows
57
Microwave sensor
_ detects movement by observing reflections of microwaves
58
Ultrasonic sensors
_ echo location, measuring distance
59
bollard
_ short vertical post of reinforced concrete and steel _ barricade inhibiting cars
60
Vendor diversity
_ implementing security controls from multiple vendors to reduce changes of a single vulnerability allowing access
61
RAID
_ redundant array of inexpensive disks
62
RAID-0
_ striping _ no redundancy across disks _ improves performance by spreading a file across multiple disks
63
RAID-1
_ mirroring _ only redundancy _ twice as many disks
64
RAID-5
_ 3+ disk striped together with parity _ If one disk goes down, data can be recovered
65
RAID-6
_ like RAID-5 but uses an additional disk for additional parity _ two disk can go down and data still recovered
66
RAID-10
_ aka RAID 1+0 _ mirroring and striping _ 4+ drives _ requires twice the drive capacity of data stored
67
Source IP address affinity
_ ensures load balanced connection goes to same server for duration of a session
68
Load balancing with persistence
_ uses source IP address affinity to keep sessions hitting the same backend node
69
active/active vs active/passive load balancers
_ active/active distributes load across multiple nodes _ active/passive changes the receiving node only when the prior receiving node goes down
70
NIC teaming
_ combining multiple NICs into one virtual NIC _ load balances across NICs _ improves performance and reliability
71
NAS
_ networked attached storage _dedicated computer for file storage
72
SAN
_ storage area network _ block-level data storage _ high-speed
73
Differential vs incremental backup
_ differential backs up all data that changed since last full backup _ incremental backs up all data that changed since last full or incremental backup
74
journaling
_ backup technique _ records changes to data or files in a log (aka journal) _ can apply changes given in log for recovery _ useful in databases and filesystems
75
BCP
_ business continuity plan
76
BIA
_ business impact analysis _ part of the BCP _ identifies mission-essential functions
77
RTO
_ recovery time objective _ max time allowed for restoring system after outage
78
RPO
_ recovery point objective _ period of time over which data loss is acceptable (e.g. just the most recent week)
79
MTBF
_ mean time between failures
80
MTTR
_ mean time to repair (or recover)
81
COOP
_ continuity of operations planning _ plan for restoring essential functions after outage
82
Recovery site
_ sites established for resiliency _ hot sites, warm sites, and cold sites
83
Hot site
_ recovery site that is always operational, ready to go _ usually takes at least a little time to switch over
84
Cold site
_ recovery site that isn’t ready to go but has power and connectivity
85
Warm site
_ recovery site that remains partially operational
86
DRP
_ disaster recovery plan _ how to recover critical systems and data _ a BCP may have multiple DRPs for different disasters
87
Disaster recovery steps
_ activate the DRP _ implement contingencies (e.g. change to a recovery site) _ recover critical systems _ test recovered systems _ after-action report (lessons learned, updated plan)
88
Tabletop exercises
_ discussion of hypothetical scenarios to plan for disasters