Threats/Risk/Vulnerability Flashcards

(20 cards)

1
Q

What is a threat?

A

Any circumstance or event that can negatively impact assets.

Threats can come from various sources, including insider threats and advanced persistent threats (APTs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define vulnerability.

A

A weakness that can be exploited by a threat.

Organizations need to regularly inspect for vulnerabilities within their systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary goal of risk management in organizations?

A

To protect assets.

Assets can be digital or physical, including personal information and physical items like servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List four common strategies used to manage risks.

A
  • Acceptance
  • Avoidance
  • Transference
  • Mitigation

Each strategy has its own approach to handling risk and maintaining business continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an insider threat?

A

Staff members or vendors who abuse their authorized access to obtain data that may harm an organization.

Insider threats can come from current or former employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does APT stand for?

A

Advanced Persistent Threat.

APTs involve a threat actor maintaining unauthorized access to a system for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a low-risk asset?

A

Information that would not harm the organization’s reputation or ongoing operations, and would not cause financial damage if compromised.

This type of asset is generally considered safe from significant threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a high-risk asset?

A

Information protected by regulations or laws, which if compromised would have a severe negative impact on an organization’s finances, ongoing operations, or reputation.

High-risk assets require stringent security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: A _______ is anything that can impact the confidentiality, integrity, or availability of an asset.

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ransomware?

A

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.

Ransomware attacks can lead to significant financial losses and operational disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three layers of the web?

A
  • Surface web
  • Deep web
  • Dark web

Each layer has different accessibility and content types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is external risk?

A

Anything outside the organization that has the potential to harm organizational assets.

Examples include threat actors attempting to gain access to private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is internal risk?

A

A current or former employee, vendor, or trusted partner who poses a security risk.

Internal risks can often be more challenging to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the significance of legacy systems in risk management?

A

Old systems that might not be accounted for or updated can still impact assets.

Examples include outdated workstations or old mainframe systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: A _______ is a technique that exploits human error to gain private information.

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the OWASP Top Ten?

A

A standard awareness document about the top 10 most critical security risks to web applications, updated regularly.

It emphasizes the importance of staying current with the evolving cybersecurity landscape.

17
Q

What is a common vulnerability related to Microsoft Exchange servers?

A

ProxyLogon.

This vulnerability allows a threat actor to deploy malicious code from a remote location.

18
Q

What does ZeroLogon affect?

A

Microsoft’s Netlogon authentication protocol.

It is a vulnerability that can compromise user identity verification.

19
Q

What is a common consequence of insufficient logging and monitoring?

A

Attackers exploiting vulnerabilities without the organization knowing it.

Effective logging is crucial for identifying and addressing security incidents.

20
Q

What is server-side request forgery?

A

A vulnerability that allows attackers to manipulate a server-side application into accessing and updating backend resources.

This can also lead to data theft.