risk management and threat modeling

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

risk assessment

identifies and prioritizes risks

2
New cards

threat

external force jeopardizing security

3
New cards

threat vectors

the specific methods that threats use to exploit a vulnerability

4
New cards

vulnerability

weakness in security controls

5
New cards

risks

the combination of a vulnerability and a corresponding threat

6
New cards

qualitative risk assessment

uses subjective ratings to evaluate risk impact and likelihood

7
New cards

quantitative risk assessment

use objective numeric ratings to evaluate risk likelihood and impact

8
New cards

Asset Value (AV)

the dollar value of an asset

  • 3 techniques: original cost, depreciated cost, and replacement cost

9
New cards

Exposure Factor (EF)

expected percentage of damage to an asset

10
New cards

Single-Loss Expectancy (SLE)

expected dollar loss if a risk occurs one time

asset value (AV) * times exposure factor (EF) = SLE

11
New cards

Annualized Rate of Occurence (ARO)

number of times a risk is expected to occur each year

12
New cards

Annualized Loss Expectancy (ALE)

expected dollar loss from a risk in any given year

13
New cards

Mean Time to Failure (MTTF)

average time a nonrepairable component will last

14
New cards

Mean Time between Failures (MTBF)

average time gap between failures of a repairable component

15
New cards

risk management/treatment

systematically analyzing potential responses to each risk and implementing strategies to control those risks appropriately

16
New cards

risk avoidance

changes the organization’s business practices

17
New cards

risk transference

shifts the impact of a risk to another organization

18
New cards

risk mitigation

reduces the likelihood or impact of the risk

19
New cards

control assessments

test control effectiveness

20
New cards

risk register

tracks risk information

21
New cards

threat intelligence

shares risk information

22
New cards

NIST risk management framework

  1. categorize information system

  2. select security controls

  3. implement security controls

  4. assess security controls

  5. authorize information system

  6. monitor security controls

23
New cards

ISO 31000 Risk Management

  • risk identification

  • risk analysis

  • risk evaluation

  • risk treatment

  • establishing the context

  • monitoring and review

24
New cards

threat intelligence

the set of activities that an organization undertakes to educate itself about changes in the cybersecurity threat landscape, and adapt security controls based upon that information

25
New cards

open source intelligence sources

  • security websites

  • vulnerability databases

  • news media

  • social media

  • dark web

  • info sharing centers

  • file repositories

  • code repositories

  • security researchers

26
New cards

threat sharing frameworks

  • The Cyber Observable eXpression or CybOX framework, provides a standardized schema for categorizing security observations. CybOX helps us understand what properties we can use to describe intrusion attempts, malicious software, and other observable security events when we're trying to explain them to other people.

  • The Structured Threat Information eXpression or STIX, is a standardized language used to communicate security information between systems and organizations. STIX takes the properties of the CybOX framework and gives us a language that we can use to describe those properties in a structured manner.

  • Trusted Automated eXchange of Indicator Information or TAXII, is a set of services that actually share a security information between systems and organizations. TAXII provides a technical framework for exchanging messages that are written in the STIX language. STIX, TAXII and CybOX work together and they're part of a community driven effort facilitated by the US Department of Homeland Security.

  • OpenIOC is another framework

27
New cards

ISACs

information sharing and analysis centers

28
New cards

Security orchestration, automation, and response (SOAR)

enhances SIEM capabilities

29
New cards

threat hunting

organized systematic approach to seeking out indicators of compromise on our networks using expertise and analytic techniques

30
New cards

indicators of compromise

  • unusual binary files

  • unexpected processes or resource consumption

  • deviations in network traffic

  • unexplained log entries

  • unapproved configuration changes