Security Exam #1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Risk Assessment Process

1.Identify threats and vulnerabilities 2.Identify the likelihood that a risk will occur 3.Identify asset values 4.Determine the impact of a risk 5.Determine the usefullness of a safeguard or control

Risk Methodology

A description of how you will manage risk.

Risk Register Contents

A description of the risk Expected impact if the event occurs The probability of the event occurring Steps to mitigate the risk Steps to take shold event occur Risk Ranking.

Risk Register

A list of identified risks.

Event

A measurable occurrence that has an impact on the business.

Risk Assessment

A process used to identify, assess, prioritize, and address risks on the vasis of threats and vulnerabilities, BEFORE they lead to an incident.

Countermeasure

A targeted control, provide specific protection, put in place in repsonse to some event/attack.

Vulnerability

A weakness that allows a threat to be realized or to have an effect on an asset.

Policy Definition Phase

Decides who has access and what systems or resources they can use. -tied to the authorization

Compensating Control

Desinged to address a threat in place of a preferred control that is too expensive or difficult to implement.

What are some risk controls?

Detective Preventive Corrective Deterrent Compensating

Deterrent Controls

Deter an action that could result in a violation. They merely attempt to suggest that a subject should not take some action.

Types of Formal Models of Access Control

Discretionary AC Mandatory AC Non-Discretionary/ Role-Based AC Rule-Based AC

What is the following: The malfunction of a badge reader on the employee entrance. Employees calling in sick Probability or Impact?

Probability

Risk are ___________ based on importance or impact severity, and then prioritized.

Quantified

Risk Assessment Approaches

Quantitative Qualitative

Risk Assessment: Qualitative Approach

Ranks risks based on their probability or cocurrence and ipact on business operations.

Corrective Controls

Reduce the effects of a threat.

What are the three phases of Risk Management?

Risk Assessment Risk Mitigation Evaluation and Assurance

Risk Management Strategies

Risk Sharing Risk Control Risk Acceptance Risk avoidance

Richman Investments provides high-end smartphones to several employees. The value of each smartphone is $500, and approximately 1,000 employees have these company-owned devices. In the past year, employees have lost or damaged 75 smartphones. What is the SLE, ARO, and ALE?

SLE- 500 ARO- 75 ALE-SLE*ARO-->$500*75=$37,500

Location Authentication

SOMEWHERE you are

Characteristics Authentication

Something you ARE

Action Authentication

Something you DO

Ownership Authentication

Something you HAVE

Knowledge Authentication

Something you KNOW

What are some examples of threats?

State actor hacking, insider threats, hacktivism, accounting fraud.

What is a example of an adversarial threat?

State-sponsored hacking

Preventive Controls

Stop threats form coming in contact with a vulnerability.

Impact

The amount of harm a threat exploiting a vulnerability can cause. Negative result if a risk occurs

Recovery Time Objective (RTO)

The amount of time it takes to recover and make system, application, and data available after an outage.

Meant time for Failures (MTTF)

The average amount of time between failures for a particular system.

Mean time to repair (MTTR)

The average amount of time to repair a system, application, or components.

Information System Security

The collection of activities that protect the information system and the data stored in it.

What is the following: A workstation that fails to boot up A production system breaking down Probability or Impact?

Impact

Opportunity

Ability to carry out misappropriation of cash or organiztonal assets.

Safeguard

Addressses gaps or weaknesses in controls that could lead to a realized threat.

What are the Threat Identification?

Adversarial Accidental Structural Environmental

Zero Day

An unpatched software hole previously unknown to the software vendor and the code attackers use to take advantage of said hole.

Threat

Any action that could damage an asset. an opporunity to exploit a vulnerability.

Incident

Any event that violates or threatens to violate your security policy.

Risk Assessment: Quantitative Approach

Attempts to descibe risks in finacial terms and put a dollar value on each risk.

What are the Access Control Components?

Authorization Identification Authentication Accountability

What are the two phases that the four parts of the access control categorized in?

Policy Definition Policy Enforcement

What are some common threats in the Remote Access Domain?

Brute-forec user ID and password attacks Multiple logon retries and access control attacks Unauthorized remote access to IT system, applicaiton, and data Confidential data ompromised remotely

What are some examples of vulnerabilities?

Poor system integration, poor system configuration, open culture, lack of employee/student awareness.

Information System

Combination of hardware, software, data, processes, and people.

What is the CIA Triad?

Confidentiality Integrity Availability

Access Control List (ACL)

Contains a list of users and gourps to which the user has permitted access together with the level of access for each user or group.

Logical Access Control

Control access to a omputer system or network.

Physical Access Control

Control entry into buildings, parking lots, and protected areas

What are the Risk control tradeoff?

Cost Operational Impact (Convenience Vs Security trade off) Feasbility

Annual Loss Expectancy (ALE)

Expected loss for a year Formula: SLE x ARO SLE- Single loss Expectancy ARO- Annual rate of occurrence

What are some examples of a Corrective Control?

Forensics and Incident Responses

Availability

Formula: =Total U/(Total U + Total D) Key: -D-->Downtime -U-->Uptime

What is a example of an Structural threat?

Fraud

Policy Enforcement Phase

Grants or rejects request for access based on the authorizations defined in the first phase. - tied to identification, authrntication, and accountability.

Fraud Triangle

Has 3 elements to it: Rationalization Pressure Opportunity

Detective Controls

Identify that a threat has landed in your system.

Control

Includes both safeguards and countermeasures.

What is a examples of a Detective Control?

Intrusion Detection System (IDS)

What is a example of a Preventive Control?

Intrustion Prevention System

What is the 3 requirement for a data to have integrity?

It has not been altered. It is valid. It is accurate.

Rationalization

Justification of dishonest action.

What are some Authentication Types?

Knowledge Ownership Characteristics Location Action

What are some common threats in the User Domain?

Lack of awareness Apathy toward policies Violating security policy Inserting CD/DVD/USB with personal files Downloading photos, music, or videos Destructing systems, applications, and data Disgruntled employee attacking organization or committing sabotage Employee blackmail or extortion Fraud

Probability

Likelihood that a threat agent willl exploit a vulnerability.

Risk

Likelihood that something bad will happen to an asset. Formula: _______ Level = probaility x Impact(cost)

How is risk primarily determined, by which 3 function within Risk assessment analysis?

Liklihood of a threat to exploit a vulnerability Impact on the org. Sufficienty of contorls to either eliminate or mitigate.

Integrity

Maintain valid, uncorrupted, and accurate information.

What are some examples of a risk?

Major earthquake, tsunami, extended power outage, data loss.

Pressure

Motivation or incentive to commit fraud.

What is a example of an Environment threat?

Natural Disasters

What is a example of an Accidental threat?

Non-malicious Insiders

Annual Rate of Occurrence (ARO)

Number of times an incident is expected to occur in a year.

What is the difference between a Deterrent Control and a Preventive Control?

One control suggests that a subject should not take some action while the other control does not allow the action to occur.

What are some common threats in the WAN Domain?

Open, public, and accessible data Most of the traffic being sent as clear text Vulnerable to eacesdropping and malicious attacks Vulnerable to denial of service (DoS) and Distributed denial of services (DDoS) attacks Hackers and attackers emailing trojans, worms, and malicious software freeely and constantly.

What are some examples of confidentiality ?

Personal data and information Intellectual Property National Security

What are the two types of Access Controls?

Physical Logical

Cryptography

Practice of hiding data and keeping it away from unauthorized users.

Discretionary Access Control (DAC)

The owner of the object specifies which subjects can access the object. The access properties are stored in the ACL, Access Control List.

Access Control

The process of protecting a resource so that it is used only by those allowed to do so.

Encryption

The process of transforming data from cleartext into Ciphertext.

Ciphertext

The scrambled data that are the result of encrypting cleartext.

What is an example of a Ownership-based authentication type?

Token ID Card

Single Loss Expectancy (SLE)

Totlat loss expected from a single incident Formula: AV x EF AV- Asset Value EF- Exposure Factor

What are some common threats in the Workstation Domain?

Unauthorized access Unauthorized access to system, application and data Desktop or laptop oprating system vulnerabilites and/or patches Virusess, malicious code, and other malware User inserting CD/DVD/USB with personal files Downloading photos, music, or videos

What are some common threats in the Systems/Application Domain?

Unauthorized access to data centers, computer rooms, and wiring closets Difficult-to-manage servers that require high availability Corrupt or lost data Server operating systems software vulnerability management Security required by cloud computing virtual environments

What are some common threats in the LAN Domain?

Unauthorized physical access Unauthorized acces to systems, application, and data ______ server operating system vulnerabilities _____ server application software vulnerabilites and software patch Rogue users on WLAN Confidentialtiy of data on WLAN

What are some common threats in the LAN-to-WAN Domain?

Unauthorized probing and port scanning Unauthorized access IP router, firewall, and network appliance oprationg system vulnerability Local users downloading unknown file types from unknown sources.

What is an example of a Characteristics-based authentication type?

Unique rentinal pattern Fingerprint

What are the seven domain in a typical IT Infrastructure?

User Domain Workstation Domain LAN Domain LAN- to- WAN Domain WAN Domain Remote Access Domain System/Application Domain

What are some examples of Integrity?

User names and password Patents and Copyrights Source Codes Diplomatic Information Financial data

What is an example of a knowledge-based authentication type?

Username Password

What are you trying to balance when it comes to risk management options?

Utility and cost Ex. - a countermeasure without a corresponding risk is a solution seeking a problem, difficult to justify the cost.


संबंधित स्टडी सेट्स

FDM 1304 Chapter 6-11 Canvas Quizzes

View Set

Chapter 6 review (fundamentals of nursing)

View Set

История Казахстана БТЗ insta: moontheesq KazGASA

View Set

Chapter 6: Culture and Ethnicity

View Set

NURS20025 Abrams Chapter 31-34, 41 Questions

View Set