Cybersecurity Risk Management & Incident Response: Key Concepts and Frameworks

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/87

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

88 Terms

1
New cards

Recover

Assets and operations affected by a cybersecurity incident are restored

2
New cards

Tangible Assets

Are physical in nature

3
New cards

Most important CIS Security Controls

Hardware and software asset inventory

4
New cards

Event

Any observable occurrence involving computing assets

5
New cards

Adverse Event

Any event associated with a negative consequence

6
New cards

Computer Security/Cybersecurity Incident

Actually or imminently jeopardizes without lawful authority the Confidentiality, integrity or availability of information systems

7
New cards

Breach

The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where a person other than an authorized user accesses or potentially accesses personally identifiable information

8
New cards

Threat Event

An event or situation that has the potential for causing undesired consequences or impact

9
New cards

Attack

Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself

10
New cards

CVE Mission

Identify, Define, Catalog publicly disclosed cybersecurity vulnerabilities

11
New cards

CVE Record

One CVE Record for each vulnerability

12
New cards

NVD Purpose

U.S. government repository of vulnerability management data

13
New cards

Supplemental

Does not modify the final score and are used as additional insight into the characteristics of a vulnerability

14
New cards

Known vulnerabilities

Exploited in the wild

15
New cards

Common Weakness Enumeration (CWE)

A taxonomy for identifying the common sources of software flaws (e.g., buffer overflows, failure to check input data)

16
New cards

Risk Assessment

The process of identifying risks to the following resulting from the operation of a system

17
New cards

Financially motivated actors

Cyber campaigns or groups directed by a criminal organization with the motivations of financial gain

18
New cards

Influence operations

Information campaigns communicated online or offline to manipulate fashion to shift perceptions, behaviors, or decisions by the target audience to further a group or nation's interests

19
New cards

Advanced Persistent Threat (APT)

Well-resourced and engage in sophisticated malicious cyber activity that is targeted and aimed at prolonged network/system intrusion

20
New cards

Ransomware as a Service (RaaS)

Ransomware is sold or leased to another organization

21
New cards

Affiliates

Has access to one or more ransomware families and conducts the attack

22
New cards

Adversary

A person or group that conducts or has the intent to conduct detrimental activities

23
New cards

CTI Purpose

Provides context for decision making; Helps SOC/IR teams move from reactive to proactive defense

24
New cards

Compromise

The reduction or eradication of trust of an endpoint, network, environment, identity, application, service, secret, or data due to intentional malicious activity

25
New cards

Indicator of compromise

Anomalous data or behavior suggesting a potential or observed compromise from a cybersecurity attack or intrusion

26
New cards

Campaign

Any grouping of intrusion activity conducted over specific period of time with common targets and objectives

27
New cards

Atomic

The smallest unit: IP, email, hostname, etc

28
New cards

Behavioral

Patterns of adversary actions: tactics, techniques, procedures, actor preferences

29
New cards

Govern

The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored

30
New cards

Identify

The organization's current cybersecurity risks are understood

31
New cards

Protect

Safeguards to manage the organization's cybersecurity risks are used

32
New cards

Detect

Possible cybersecurity attacks and compromises are found and analyzed

33
New cards

Respond

Actions regarding a detected cybersecurity incident are taken

34
New cards

Asset

Anything that has value to an organization or enable it to achieve its business processes

35
New cards

Intangible Assets

Are not physical in nature and include mission and business processes, functions, digital information and data, firmware, software, and services

36
New cards

High Value Asset

Information or an information system that is so critical to the organization that the loss would have serious impact

37
New cards

Incident Response

The remediation or mitigation of violations of security policies and recommended practices

38
New cards

Risk

A measure of the extent to which an entity is threatened by a potential circumstance or event. Impact + Likelihood = risk

39
New cards

Risk Management

The program and supporting processes to manage risk

40
New cards

Impact

The effect on an organization's operations

41
New cards

Likelihood

A weighted factor based on a subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability or a set of vulnerabilities.

42
New cards

Threat

Any circumstance or event with potential to adversely impact the organization

43
New cards

Threat Source/agent

The intent and method targeted at the intentional exploitation of a vulnerability or a situation and method that may accidentally trigger a vulnerability

44
New cards

Threat Outcome

The effect a threat action upon a vulnerability has on the CIA of the organizations operations, assets, or individuals

45
New cards

Predisposing conditions

Properties of the organization, mission or business process, architecture, or information systems that contribute to the likelihood of a threat event

46
New cards

Vulnerability

A weakness in a system which an actor or event may intentionally exploit or accidentally trigger the weakness to access, modify, or disrupt the normal operations of a system, resulting in a security incident or violation of the systems security policy

47
New cards

Common Vulnerabilities and Exposures (CVE)

Managed by MITRE Corporation

48
New cards

CVE Vulnerability Naming authorities

CISA, Mitre, Adobe, Apache, etc

49
New cards

Nation Vulnerability Database (NVD)

Managed by NIST

50
New cards

NVD Contents

Including: Security checklist references, Security related software flaws, Misconfigurations, Product names, and Impact metrics

51
New cards

Common Vulnerability Scoring System (CVSS)

Managed by First.org

52
New cards

CVSS Purpose

Communicates the characteristics and severity of software vulnerabilities

53
New cards

Scored 0-10

Is a measure of severity, no risk

54
New cards

CVSS's 4 metrics

Base, Threat, Environmental, and Supplemental

55
New cards

Base

Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments

56
New cards

Environmental

Represents the characteristics of a vulnerability that are unique to the user's environment

57
New cards

Attack Vector

In CVSS it takes into account Network, Adjacent, local, and physical

58
New cards

Known Exploited Vulnerabilities Catalog (KEV)

Managed by CISA

59
New cards

Weaknesses

Poor coding practices, as exemplified by CWEs

60
New cards

Risk Response

Accepting, Avoiding, Mitigating, Sharing, or transferring risk to agency operations, agency assets, individuals, other organizations, or the nation

61
New cards

Risk Mitigation

Prioritizing, evaluating, and implementing the appropriate risk reducing controls/countermeasures recommended from the risk management process

62
New cards

Cyber Threat

Three classes of increasing sophistication of an attacker

63
New cards

Tiers I-II

Exploits pre-existing known vulnerabilities

64
New cards

Tiers III-IV

Discovers unknown vulnerabilities

65
New cards

Tiers V-VI

Creates vulnerabilities using full spectrum

66
New cards

Nation State Actors

Cyber operations acting on behalf or directed by a nation or state aligned program

67
New cards

Private sector offensive Actors (PSOAs)

Cyber activity led by commercial actors that are known legitimate legal entities

68
New cards

Groups in development

A temporary designation given to an unknown, emerging, or developing threat activity

69
New cards

APT Goals

Cyber espionage, including theft of intellectual property or state secrets, eCrime for financial gain, Hacktivism, Destruction

70
New cards

Stages of APT Attack

Infiltration, Escalation and lateral movement, Exfiltration

71
New cards

Nation State

A group of people who share the same language, history, and traditions and live in a specific area. They have their own government and are considered a sovereign state.

72
New cards

Gangs/Operators

Develops and maintains tools, sold to affiliates

73
New cards

Initial Access Brokers

Infect systems with malware or a botnet and sell them as a load. Access sold to affiliates

74
New cards

Attacker

A party, including an insider, who acts with malicious intent to compromise a system

75
New cards

Threat Actor (TA)

An individual or group posing a threat

76
New cards

MITRE Att&ck Enterprise

14 tactics represent the 'why' of a technique

77
New cards

Cyber Threat Intelligence (CTI)

Cyber threat information that has been aggregated, transformed analyzed, interpreted, or enriched to provide the necessary context for decision making processes

78
New cards

CTI Types

Strategic, Operational, Tactical

79
New cards

CIS Critical Security Controls

18 controls

80
New cards

Continuous monitoring

Assets are monitored to find anomalies, indicators or compromise, and other potentially adverse events

81
New cards

Intrusion

An adversary gains unauthorised access to an endpoint, network, environment, application, or service

82
New cards

Anomaly

Condition that deviates from expectations based on requirements specifications, design documents, user documents, or standards, or from someone's perceptions or experiences

83
New cards

Indicator of Attack (IOA)

Intent of an adversary's actions suggested by anomalous data or behaviors

84
New cards

IOC Types

Atomic, Computed, and Behavioral

85
New cards

Computed

Match multiple atomic IOCs: hash regular expression

86
New cards

Threat Hunting

The proactive search for undetected suspicious and malicious activity in an environment

87
New cards

Telemetry

Artifacts derived from security capabilities that provide visibility into security posture. ISO 8601 time format: YYYY-MM-DDTHH:MM:SS.mmm[Z|±hh:mm]

88
New cards

Still learning (28)

You've started learning these terms. Keep it up!