Section 1 Risk Management Flashcards
(43 cards)
What is the CIA of security?
Confidentiality, Integrity, Availability.
Don’t forget - auditing, accountability & non-repudiation
What is non-repudiation?
It’s when a user cannot deny having done a particular action.
What are the 5 attributes of threat actors?
Internal/external Level of sophistication Resources/funding Intent Open Source Intelligence
What is OSINT?
Open Source Intelligence. It provides ample info to intrigue a threat actor.
What is a Script Kiddy threat actor?
Trivial knowledge
Uses scripts
Lock picker
Blocked by firewalls
What is a Hacktivist?
A threat actor whose Intent is powered by motivation. So consider their goal.
How is organized crime a threat actor?
Motivation is to make money!
How is a Nation State a threat actor? And what does APT stand for?
Motivation is intelligence.
They are Advanced Persistent Threats. Tonnes of resources.
How are “insiders” a threat actor?
They are anyone with access e.g. Have a userName + PW
- vendors
- contractors
- cleaning crews
Give some examples of assets that are at risk
Any part of infrastructure - computers, people, servers, company reputation
Give some examples of risk vulnerabilities
Unlocked server room, default PWs
Give some examples of threats
Threats are actions. (The person involved in the threat is a threat agent.)
E.g. - Someone able to access a server room.
- Someone critical to the team quits.
What is a threat?
A threat is a discovered action that exploits a vulnerability’s potential to do harm to an asset.
What is a threat agent?
Usually a person who initiates a threat. (But could be something like a hurricane!)
What is likelihood when related to risk and threats?
Often depicted as a % and for a year timespan.
What are the two ways risk likelihood is measured?
Quantitative and Qualitative
Give an example of quantitative likelihood risk
Router with a power supply - there’s a risk it might die. Something measurable - time, cost.
Give an example of qualitative likelihood risk
Harder to measure - customer loyalty. “Low Med, High”
What is impact?
The actual harm caused by a threat,
What is the formula to calculate risk?
threats x vulnerabilities = risk
or
threats -> vulnerabilities = risk
What is the NIST SP 800-30?
National Institute of Standards and Technologies Document that lists all possible threats and vulnerabilities to assess risks.
What are the two risk assessment steps?
- Vulnerability Assessment
- Threat Assessment
What is the “CVE” on cve.mitre.org?
“Common Vulnerabilities and Exposures” database. Used to assess risk - very detailed.
What is Nessus?
The Nessus is a program that is ran locally and generates data for any vulnerabilities it finds.