SSCP Domain 3

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/127

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

128 Terms

1
New cards

What is a threat vector?

It is the method that an attacker uses to get to your target. This might be a hacker tool kit, social engineer, or physical intrusion.

2
New cards

What are vulnerabilities?

They are weaknesses in your security controls that a threat might exploit to undermine CIA.

This includes missing patches, promiscuous firewall rules, or other security misconfigurations.

3
New cards

What is impact?

Amount of expected damage from a risk

4
New cards

What is a qualitative risk assessment?

Subjective judgement to assess risks, typically categorizing them as low, medium, or high on both the likelihood and impact scales.

5
New cards

What is a quantitative risk assessment?

Objective numeric ratings to assess likelihood and impact.

1. Asset value

2. Exposure factor

3. Single Loss Expectancy

Helps us assess our ability to restore IT services and components quickly in the event of a failure.

6
New cards

What is Asset Value?

The dollar value of an asset:

1. Original cost

2. Depreciated cost - Assets actual cost and then reduces its values over time as the asset ages.

3. Replacement cost

7
New cards

What is exposure factor?

Based upon the specific risk considered in the risk assessment, and this variable estimates the percentage of an asset that will be damaged if that risk materializes.

8
New cards

What is single loss expectancy?

Give us an idea of IMPACT of a specific risk during an assessment. Multiply the asset value by the exposure factor.

i.e., Data Center AV = $20 million

Flood damage EF = 50% of facility will be damaged

AV * EF = SLE

SLE = $10 million

9
New cards

What is the metric to use for non-repairable assets?

Mean Time to Failure (MTTF)

Average time a non-repairable component will last

10
New cards

What is the metric to use for repairable assets?

Mean Time between Failures (MTBF) of a repairable component

11
New cards

What is the metric to use to return a repairable asset?

Mean Time to Repair (MTTR)

Average time required to return a repairable component to service.

12
New cards

What is risk avoidance?

You change your organization's business practices so that you're no longer in a position where that risk can affect your business.

i.e., relocate or open a data center in a non-flooding area

13
New cards

What is risk transferrance?

Transferring a risk attempts to shift the impact of a risk from your organization to another organization.

14
New cards

What is risk acceptance?

It is accepting risk without taking further action.

Ignoring a risk is not the same as accepting a risk.

Ignoring a risk is a failure of risk management

15
New cards

What is a risk profile?

The full set of risks facing an organization

There is inherent risk, residual risk, and control risks.

16
New cards

What is inherent risk?

It is the initial level of risk that existed in an organization before any controls are put in place

17
New cards

What is residual risk?

The risks that remains after the inherent risk is reduced by controls.

Controls may introduce risks themselves.

18
New cards

What is risk tolerance/appetite?

It is the risk that leaders choose to accept.

19
New cards

What is a control assessment used for?

To test control effectiveness.

An organization should routinely review those risk assessments and perform periodic control assessments designed to test the correct functioning and effectiveness of their security controls.

i.e., A control assessment can be implemented on a firewall that is trying to block unwanted network traffic. An assessment of the firewall might use network scanning tools to verify that it is not allowing any unwanted traffic through the perimeter.

20
New cards

How can you measure control effectiveness?

- Compromised end-user accounts

- Vulnerabilities in public-facing systems

- Critical findings in initial web application scans

- Data breaches requiring notification

21
New cards

What is the purpose of NIST?

It is a risk management framework which is found ins NIST 800-37.

22
New cards

What must be gathered before entering into the Cybersecurity framework process.

1. Information technology architecture. It includes reference models, technical details, business process information, and information system boundaries

2. Organization of specific information, including laws, regulations, and policies that apply, the strategy of the organization, its priorities, resource available, and supply chain information.

23
New cards

What is the first step in the NIST Risk Management framework?

Categorize information systems.

This includes architectural description and organizational inputs.

24
New cards

What is the second step in the NIST Risk Management framework?

Select security controls.

Tailoring controls specific to Step 1, categorization.

Now the organization can begin with a standard baseline of controls and then add/subtract specific controls to tailor the specification to the system's needs.

25
New cards

What are the steps in the NIST framework after the first 2 steps are established?

The first step steps to the NIST Risk Management Framework are Categorize and Select security controls. Afterwards, it is:

3. Implementing

4. Assess the security controls

5. Authorize

6. Monitor

26
New cards

What should be identified for ISO 31000 Risk management framework?

Risk Identification

Risk Analysis

Risk Evaluation

Risk Treatment

Establishing the context

Monitoring and review

Communication and consultation

27
New cards

What is a risk register?

It is a tool that organizations use for maintaining ongoing visibility into risks.

it is a centralized document that tracks information about the nature and status of each risk facing the organization.

It can be organized by either the schemes of the risks, grouping, impact of the risk, and probability and impact scores.

It can also includes actions to take.

28
New cards

What is an externally occuring force that jeopardizes the security of your systems?

A threat

29
New cards

What type of tool is NMAP?

Port scanning tool

30
New cards

What is threat intelligence?

It is all the activities that are ongoing in the cybersecurity threat landscape and integrating information about changing threats into its cybersecurity intelligence.

31
New cards

What are the three criteria's you can use to see how reliable a threat intelligence source is?

Timeliness

Accuracy

Reliable

32
New cards

What are threat indicators?

They are properties/pieces of information that describes a threat.

i.e., IP addresses, malicious files, signatures, communication patterns, or other identifies that a threat analyst can use to identify a threat actor.

33
New cards

What is the CybOX framework?

A standardized schema for categorizing security observations.

CybOX helps us understand what properties we can use to describe intrusion attempts, malicious software, and other observable security events when we try to explain it to people.

34
New cards

What is STIX?

It is a standardized language used to communicate security information between systems and organizations.

STIX takes the properties of the CybOX framework and gives us a language that we can use to describe those properties in a structured manner.

35
New cards

What is TAXII?

Trusted Automated Exchange of Indicator Indication; 3 types of architectures hub/spoke, source/subscriber, peer to peer.

TAXII provides a technical framework for exchange messages that are written in the STIX language.

36
New cards

Describe the process of how CybOX, STIX, and TAXII all work together.

CybOX provides the schema that we can use to classify different threats

CybOX is used to define the information elements that we can then represent using the language of STIX.

Then we can exchange STIX formatted threat information using TAXII.

37
New cards

What is OpenIOC?

A framework for describing and sharing security threat information.

38
New cards

What is ISACs and the goal of it?

Information Sharing and Analysis Centers

To bring together cybersecurity teams from competing organizations to help share industry specific information in a confidential manner.

The goal is to gather and disseminate threat intelligence without jeopardizing anonymity.

39
New cards

What strategies can an organization use to create a structured approach for threat identification for potential threats to information and systems?

Assets approach - Looking at inventory and identifying potential threats to the asset. This can be fiber optic cables

Threat focused approach - Think of all possible threats out there and how they might affect your organizational information systems. Contractors, partners, and rogue employees

Service focused approach - Service providers who offer services over the internet to other organizations. i.e., an organization that exposes an API to the public might think all the interfaces offered by that API and the threats that could affect each interface.

40
New cards

What assists SIEMs with automation?

SOAR platforms

They automate the routine work of cybersecurity by facilitating automated responses.

41
New cards

What does it mean when a threat actor undermines confidentiality?

Confidentiality ensures that only authorized individuals have access to the information and resources. Malicious attackers engage in disclosure, making sensitive information available to individuals or the general public without consent.

42
New cards

What is integrity for information protection?

No unauthorized changes to information.

No altering of information or service disruption accidentally affecting data stored in the system

43
New cards

What is the purpose of availability?

Ensuring that information is readily available and accessible when needed.

DoS attacks

44
New cards

What is strategic risk?

It is the risk that an organization will become less effective in meeting its major goals and objectives, as the result of a breach.

i.e., An employee loses a laptop with sensitive product information. This may lead to significant production delays and the competition can gain hold of the market

45
New cards

What is operational risk?

Risk to the organization's ability to carry out its day-day function.

It may slow down business process, delay delivery, or require manual work arounds

46
New cards

What is Compliance risk?

When a security breach causes and organization to run a foul of legal and regulatory requirements.

47
New cards

What is End-Of-Sale for a product?

Product will no longer be offered for purchase, but the vendor will support existing customers

48
New cards

What is End-Of-Support for a product?

The vendor will reduce or eliminate support for existing users of the product.

49
New cards

What is End-Of-Life for a product?

The vendor will no longer provide support or updates for the product.

50
New cards

What is a system sprawl?

New devices are connected to a network, but old devices are nor promptly disconnected, leading to security vulnerabilities.

51
New cards

What is the purpose of vulnerability management?

It is to help handle the complexity of patching all types of equipment and software in your environment.

Detects, remediates, and reports vulnerabilities.

52
New cards

What is PCI DSS requirements when it comes to vulnerability management?

- Conduct quarterly internal and external vulnerability scans

- Repeat scans after any significant change

- Use an approved scanning vendor (ASV)

- Remediate and rescan until you achieve a clean report

53
New cards

If you work for an agency of the US government, what security controls must be followed due to the enforcement of what act?

If you work for the US governemtn, you must follow the FISMA (Federal Information Security Management Act). FISMA requires that you follow the security controls found in NIST special publication 800-53.

This set of requirements includes a section on vulnerability management that requires that you:

- Regularly scan systems and applications for vulnerabilities

- Analyze the results of those scans, remediate vulnerabilities deemed legitimate

- Share information about vulnerabilities with other government agencies.

54
New cards

What type of scans should you conduct regularly to find vulnerabilities?

Network vulnerability scans

Web applications

Application scans

55
New cards

What should you supplement a vulnerability scan with?

Supplement vulnerability scans with configuration and log reviews

56
New cards

What is the good starting point for vulnerability management?

Having a set idea of your asset inventory.

Once an inventory scan is done, you want to prioritize the assets.

57
New cards

How do you determine how to prioritize the assets after an inventory scan is done?

1. IMPACT Identify the highest level of data classification that's stored, processed or transmitted by the system, device, or application.

2. LIKELIHOOD The level of risk posed to the system based upon how exposed it is to an attacker. aka, Likelihood of a successful attack? Is it exposed to the internet? External access? Is there a firewall?

3. CRITICALITY The criticality of the system and resources. How will it impact business operations?

58
New cards

What are the attack vectors when measuring the CVSS score?

Attack Vector are the types of access that an attacker has to exploit a vulnerability:

Physical

Local - physical or logical console access is required

Adjacent Network - Local network access is required

Network - Remotely exploitable vulnerability

59
New cards

What is the attack complexity when measuring the CVSS score?

High - Requires specialized conditions

Low - Does not require specialized conditions

60
New cards

What are privileges required when measuring the CVSS score?

High - Requirements administrative control

Low - Requires basic user privileges

None - Requires no privileges

61
New cards

What are user interactions when measuring the CVSS score?

Required - Requires that a user take some action

None - Does not require user interaction

62
New cards

What are the four vectors used to measure the CVSS score and what is the purpose?

The AV, AC, PR, and UI metrics combine to describe the exploitability of a vulnerability.

63
New cards

What can be used to determine the impact of a vulnerability?

CIA Triad

64
New cards

How is confidentiality rated when determining the impact of a vulnerability?

None - No confidentiality impact

Low - Access to some information is possible

High - All information compromised

65
New cards

How is integrity rated when determining the impact of a vulnerability?

None - No integrity impact

Low - Modification of some information is possible

High - All information is compromised

66
New cards

How is availability rated when determining the impact of a vulnerability?

None - No availability impact

Low - Performance is degraded

High - The system is shut down

67
New cards

How is scope rated when determining the impact of a vulnerability?

Changed - Exploiting the vulnerability can affect other components

Unchanged - Exploiting the vulnerability only affects resources managed by the same security authority

68
New cards

What are the main priorities when presenting vulnerabilities to team members during your interpretation of results?

The top 5 prioritization factors include:

1. Vulnerability Severity

2. System Criticality

3. Information Sensitivity

4. Remediation Difficulty

5. System Exposure

69
New cards

What is GAPP?

Generally Accepted Privacy Principles

10 components of data privacy that can be used to help organizations design their own privacy programs.

70
New cards

What is the first principal of the GAPP principle?

Management

An organization handling private information should have policies, procedures, and governance structures in place to protect privacy. Such as defining roles for data own, steward and custodian.

71
New cards

What is the second principal of the GAPP principle?

Notice

Anyone who is subject of records maintained by the organization should receive notice of that fact as well as access to privacy policies and procedures followed by the organization.

Through is often accomplished through the terms of agreement for a website and a formal private notice.

72
New cards

What is the third principal of the GAPP principle?

Choice and consent

The organism should inform data subject of their options regarding the data they own and get consent from those individuals for the collection, storage, use and sharing of the information.

73
New cards

What is the fourth principal of the GAPP principle?

Collection

The organization should only collect personal information for purposes disclosed in their privacy notices.

74
New cards

What is the fifth principal of the GAPP principle?

Use, retention and disposal

When the organization collects personal information, it should only use it for disclosed purposes and not use it for other reasons just because they already have the data.

They should also dispose the data when its no longer needed.

75
New cards

What is the sixth principal of the GAPP principle?

Access

Organization should provide data subjects with the ability to review and update their personal information

76
New cards

What is the seventh principal of the GAPP principle?

Disclosure to third parties

The organization should only share information with third parties that sharing is consistent with the purposes disclosed in privacy notices, and they have consent of the individuals to share that information.

77
New cards

What is the eigth principal of the GAPP principle?

Security

The organization must secure private information against unauthorized access

78
New cards

What is the ninth principal of the GAPP principle?

Quality

The organization should take reasonable steps to ensure that the private information they maintain is accurate, complete, and relevant.

79
New cards

What is the tenth principal of the GAPP principle?

Monitoring and enforcement

The organization should have a program in place to monitor compliance with its privacy policies and provide a dispute resolution mechanism.

80
New cards

What is ISO Standard 27018?

A standard that provides a code of practice for the protection of PII in public cloud environments. Organization developing and monitoring their privacy programs should conduct regular privacy impact assessments to identify the privacy ramifications of their business operations.

81
New cards

What is minimization?

Organizations should collect only the information that they need in the legitimate course of employment.

82
New cards

What is need to know?

Enforcing the amount of sensitive information that individuals should have, and this is because they possess the appropriate security credentials and clearance.

83
New cards

What is privilege aggregation/creep?

It is when least privilege is jeopardized. When old permissions are not revoked.

84
New cards

What is the separation of duties principle?

No single person should possess two permissions that, in combination, allow them to perform a sensitive operation. Those permissions should be separate.

85
New cards

What is change management?

It is a way to ensure that an organization follows a standard for requesting, reviewing, approving, and implement changes to information systems.

86
New cards

What should a request for change include?

RFC

1. Description of the change

2. Expected impact

3. Risk assessment

4. Rollback plan

5. Identity of the individuals or groups involved with the change

6. Proposed schedule

7. Affected configuration items

87
New cards

What is configuration management?

Tracks specific device settings, tracks the way a specific device is set up.

Tracks both the inventory of the software's installed on the device and operating system settings.

88
New cards

What is the terminology when you get a snapshot of the configuration?

Baselining

It can be used to assess whether a system has changed outside of an approved changed management process.

89
New cards

What should you focus on when evaluating the results of a scan for a vulnerability scan?

1. Severity

2. Criticality of the systems affected

3. Sensitivity of information involved

4. Difficulty of remediation

5. Expose of the system with the vulnerability

90
New cards

If a report says that a vulnerability requires your immediate remediation in your environment, what should you do first?

Check if the vulnerability actually exists as stated in the report.

Vulnerability scanners do produce false positives. This can be due to:

Old signatures, or a not well defined signature, or the scanner is not able to detect the presence of a security control that mitigates the vulnerability.

91
New cards

What are the four possible outcomes for any vulnerability report?

True Positive - Reports a finding that a vulnerability really exists

False Positive - Reports a find but a vulnerability does not really exist

True Negative - No findings and no vulnerabilities

False Negative - The scanner misses an actual vulnerability.

92
New cards

When validating your vulnerability scan results, what information should you validate it against?

1. Consult with any industry standards, best practices, or compliance obligations that are relevant to your organization

2. Correlate with technical information

3. Correlate with the vulnerability scan itself. Watch for historic trends and see if there are any underlying issues.

93
New cards

What is the definition of a jurisdiction?

It is the power that a court has to render legal judgements. Jurisdiction may be limited by subject matter and/or geographic applicability.

94
New cards

What is the definition of a preeption?

Law that stems from a higher authority takes precedence over laws that stem from lower authorities.

95
New cards

What is private right of action?

Laws with a private right of action grant legal persons the ability to bring cases to court.

96
New cards

What is the definition of a person?

A person is a human or non-human entity that can sue and be sued, can own property, and can take part in contracts.

This can include a legal organization or business. It is a person if it can sue or be sued, own property, and sign contracts.

97
New cards

What is the difference between PII and PHI?

PII - Any information that can be traced back to an individual

PHI - Individually identifiable health records governed under HIPAA

98
New cards

What is GAPP in relation to privacy?

Generally Accepted Privacy Principles

10 components of data privacy that can be used to help organizations design their own privacy programs.

99
New cards

What is the first principal to GAPP?

Mangement

An organization handling private information should have policies, procedures, and governance structures in place to protect privacy.

Clearly define roles for data owner, steward, and custodian.

100
New cards

What is the second principal to GAPP?

Notice

Anyone who is subject of records maintained by the organization should receive notice of the fact as well as access to privacy policies and procedures followed by the organization.