Risk and Controls (Ch. 8,9) Flashcards
(88 cards)
risk
_ likelihood that a threat will exploit a vulnerability
Inherent risk
_ risk that exists prior to using risk management controls
Residual risk
_ risk that remains after mitigating risk to an acceptable level
Control risk
_ risks of in-place controls not being sufficient
Risk appetite vs risk tolerance
_ risk willing to accept vs ability to withstand risk
_ even accepting security risk can have rewards
AV
_ asset value
_ value of an asset to the organization
Risk control assessment
_ evaluates in-place controls against known risks
Quantitative risk assessment
_ assigns monetary values to risk
EF
_ risk exposure factor
_ portion of an asset that would be damaged should a risk materialize
SLE
_ single loss expectancy
_ loss expected for a particular asset on exposure
_ SLE = AV x EF
ARO
_ annualized rate of occurrence
_ number of times loss expected to occur in a year (%)
ALE
_ annualized loss expectancy
_ loss expected in a year (per asset?)
_ ALE = SLE x ARO
Qualitative risk assessment
_ uses judgment to assess risk probability
impact
_ magnitude of harm resulting from a risk
Numerical risk
_ probability x impact
KRI
_ key risk indicator
_ metrics for monitoring risk associated with an activity, process, or system
_ e.g. security incidents per month
_ e.g. % of overdue security patches
_ e.g. avg. time to detect and respond to a security incident
Risk register
_ identifies risks
_ indicates likelihood
_ indicates potential impact
_ reports current status
_ assigns risk owners
_ good for prioritizing risks
Risk matrix
_ chart showing likelihood (probability) vs impact of a risk
_ scores the risks
Vulnerability scanner
Creates a vulnerability report but does not address vulnerabilities (aka “passive”):
_ runs either credentialed (shows what an attacker would see) or non-credentialed (which can provide more detail)
_ lists hosts discovered
_ lists apps running on each host
_ lists open ports and services on each host
_ lists vulnerabilities discovered
_ lists recommendations
Penetration test
_ starts with a reconnaissance of vulnerabilities
_ attempts to exploit vulnerabilities
Vulnerability assessment
_ identifies assets and capabilities
_ prioritizes assets based on value
_ identifies vulnerabilities and prioritizes them
_ recommends controls to mitigate vulnerabilities
Network scanner
_ gathers info about hosts
_ nmap
_ typically one of: ARP ping scan, Syn stealth scan, port scan, service scan, OS detection
ARP ping scan
_ address resolution protocol ping scan
_ hosts receiving an ARP packet with its IP address responds with a MAC address
_ response tells scanner that host is operational at an IP address
SYN stealth scan
_ scanner sends a TCP SYN to start a connection
_ looks for SYN/ACK response to know host is capable of connection
_ sends RST (reset) rather than ACK to end connection