Section 24: Threat and Vulnerability Management Flashcards

1
Q

Lockheed Martin Cyber Kill Chain

A

Lockheed Martin Cyber Kill Chain

Reconnaissance
Weaponization
Delivery
Exploitation
Installation
CC
Action on Objectives

Older model, with a linear approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MITRE ATTACK

A

Iterative Model, made to be less linear and rigid than the Cyber Kill Chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Content Automation Protocol (SCAP)

A

Standardizes the formatting and naming conventions used for software flaws, misconfigurations, and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Open Vulnerability and Assessment Language (OVAL)

A

An XML schema for describing system security states and querying
vulnerability reports and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Extensible Configuration Checklist Description Format (XCCDF)

A

▪ An XML schema for developing and auditing best-practice configuration checklists and rules
▪ With XCCDF, scanning tools and automation can be used to check our systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly