Section 1 Risk Management Flashcards

(43 cards)

1
Q

What is the CIA of security?

A

Confidentiality, Integrity, Availability.

Don’t forget - auditing, accountability & non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is non-repudiation?

A

It’s when a user cannot deny having done a particular action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 5 attributes of threat actors?

A
Internal/external
Level of sophistication
Resources/funding
Intent
Open Source Intelligence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is OSINT?

A

Open Source Intelligence. It provides ample info to intrigue a threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Script Kiddy threat actor?

A

Trivial knowledge
Uses scripts
Lock picker
Blocked by firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Hacktivist?

A

A threat actor whose Intent is powered by motivation. So consider their goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is organized crime a threat actor?

A

Motivation is to make money!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is a Nation State a threat actor? And what does APT stand for?

A

Motivation is intelligence.

They are Advanced Persistent Threats. Tonnes of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are “insiders” a threat actor?

A

They are anyone with access e.g. Have a userName + PW

  • vendors
  • contractors
  • cleaning crews
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give some examples of assets that are at risk

A

Any part of infrastructure - computers, people, servers, company reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give some examples of risk vulnerabilities

A

Unlocked server room, default PWs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give some examples of threats

A

Threats are actions. (The person involved in the threat is a threat agent.)

E.g. - Someone able to access a server room.
- Someone critical to the team quits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a threat?

A

A threat is a discovered action that exploits a vulnerability’s potential to do harm to an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a threat agent?

A

Usually a person who initiates a threat. (But could be something like a hurricane!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is likelihood when related to risk and threats?

A

Often depicted as a % and for a year timespan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two ways risk likelihood is measured?

A

Quantitative and Qualitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Give an example of quantitative likelihood risk

A

Router with a power supply - there’s a risk it might die. Something measurable - time, cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Give an example of qualitative likelihood risk

A

Harder to measure - customer loyalty. “Low Med, High”

19
Q

What is impact?

A

The actual harm caused by a threat,

20
Q

What is the formula to calculate risk?

A

threats x vulnerabilities = risk

or

threats -> vulnerabilities = risk

21
Q

What is the NIST SP 800-30?

A

National Institute of Standards and Technologies Document that lists all possible threats and vulnerabilities to assess risks.

22
Q

What are the two risk assessment steps?

A
  • Vulnerability Assessment

- Threat Assessment

23
Q

What is the “CVE” on cve.mitre.org?

A

“Common Vulnerabilities and Exposures” database. Used to assess risk - very detailed.

24
Q

What is Nessus?

A

The Nessus is a program that is ran locally and generates data for any vulnerabilities it finds.

25
What is Pen testing?
Penetration Testing is when an outside party looks for vulnerabilities in your network. It's the best way to find any problems.
26
Give an example of Adversarial threats
Hacker, malware
27
Give an example of Accidental threats
User mistakenly enters text and drops the db.
28
Give an example of Structural threats
Power supply issues, equipment failure
29
Give an example of Environmental threats
Fires, AC, earthquakes
30
What is mitigation when related to risk response?
Mitigation is effort to reduce impact of risk.
31
What is risk transference?
When you offload risk to a 3rd party - e.. use a cloud based web server - you no longer have to worry about power supply etc.
32
What is risk acceptance?
When costs to mitigate are too high, so you accept the risk - e.g. a meteor could hit your servers.
33
What is risk avoidance?
The decision to not store sensitive info, where you could be liable.
34
Name two Risk Management Frameworks
NIST Risk Management Framework Special Publication 800-37 ISACA Risk IT Framework
35
What are the four types of threats?
- Adversarial - Accidental - Structural - Environmental
36
Explain the 5 security control functions
Deterrent - deters the actor from attempting Preventative - deters the actor from performing the threat Detective - recognizes an actor's threat Corrective - mitigates the impact of a manifested threat Compensating - provides alternative fixes to any of the above!
37
Name the 3 types of security controls
Administrative or Management control - laws, policies Technical controls - firewalls, passwords Physical Controls - fences, keys, guards
38
List 5 curious security controls
Mandatory vacation - (detect weird things happening) Job Rotation Separation of Duties (administrative control - Single Resp) Multi-person control - (2 keys for missile launch!) Principle of least privilege (Need to know)
39
What is the difference between diversity and redundancy?
Redundancy is repeating the same controls at various intervals, diversity is using a variety of controls in a random pattern. Many trenches (redundant) or 1 trench, a fence, a catapult, moat etc (diverse)
40
What is "defense in depth"?
A security defense that uses all three types of controls - administrative, physical and technical controls.
41
What is vendor diversity?
A method of defense in depth with technical controls.
42
What is Security Governance?
The bunch of rules an organization operates by.
43
What laws/standards affect IT security?
HIPAA (law) NIST (standard) PCI-DSS (Credit card standards)