W2 Risk Management

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/48

flashcard set

Earn XP

Description and Tags

CS6301

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

What are the three pillars of software security?

Applied Risk Management
Software Security Touchpoints
Knowledge

2
New cards

What is the fundamental equation for risk in software security?

Risk = Probability × Impact

3
New cards

What does Applied Risk Management address in software security?

• How much effort to invest in security

• Consequences of security breaches

• Acceptable level of security

• Tracking and mitigating risk throughout the full SDLC

4
New cards

What are software security touchpoints?

System-wide activities from design to testing and feedback that include:

• Code review

• Architectural risk analysis

• Penetration testing

• Risk-based security testing

• Abuse cases

• Security requirements

• Security operations

5
New cards

What are the three categories of security knowledge?

• Prescriptive knowledge: principles, guidelines, and rules
• Diagnostic knowledge: vulnerabilities, exploits, attack patterns
• Historical knowledge: historical risks

6
New cards

What is the key question for the "Understand Business Context" stage?

"Who cares?"

7
New cards

What business goals should be identified in understanding business context?

• Increasing revenue

• Meeting service-level agreements

• Reducing development cost

• Generating high return investment

8
New cards

What is the key question for the "Identify Business and Technical Risks" stage?

"Why should business care?"

9
New cards

What are the consequences of business risks?

• Financial loss

• Loss of reputation

• Violation of customer or regulatory constraints

• Liability

10
New cards

What are the consequences of technical risks?

• Unexpected system calls

• Avoidance of control (audit)

• Unauthorized data access

• Needless rework of artifacts

11
New cards

What is the key question for the "Synthesize and Rank Risks" stage?

"What should be done first?"

12
New cards

What risk metrics are used to rank risks?

• Likelihood

• Impact

• Severity

• Number of emerging risks

13
New cards

What is the key question for the "Define Risk Mitigation Strategy" stage?

"How to mitigate risks?"

14
New cards

What constrains risk mitigation strategies?

What the organization can afford, integrate, and understand

15
New cards

What does the "Carry Out Fixes and Validate" stage measure?

• Progress against risk

• Remaining risks

• Assurance of mechanisms

• Effectiveness of risk mitigation activities

16
New cards

What does cascading damage mean in cyber attacks?

Services may rely on the attacked service, causing damage to escalate and spread beyond the initial target

17
New cards

What was the average ransom payment in Q4 2019?

$84

18
New cards

What percentage of companies that paid ransom received working decryption tools?

98 percent

19
New cards

What was the average ransomware downtime in Q4 2019?

16.2 days

20
New cards

What are the three main ransomware defense strategies?

• Back up data regularly

• Be wary of suspicious emails and links

• Apply security patches promptly

21
New cards

What does TCSEC stand for?

Trusted Computer System Evaluation Criteria (also known as Orange Book)

22
New cards

When was TCSEC established and by whom?

1985 by the National Computer Security Center (NCSC) within NSA

23
New cards

What are the three main categories of Orange Book criteria?

• Security policy – protection level offered by the system

• Accountability – of users and user operations

• Assurance – of the reliability of the system

24
New cards

What is a Trusted Computing Base (TCB)?

Security components of the system including hardware, software, and firmware plus reference monitor

25
New cards

List the Orange Book security levels from lowest to highest security.

• D: Minimal Protection

• C1: Discretionary Security Protection

• C2: Controlled Access Protection

• B1: Labeled Security Protections

• B2: Structured Protection

• B3: Security Domains

• A1: Verified Protection

26
New cards

When was Common Criteria established?

January 1996

27
New cards

What is a key improvement of Common Criteria over Orange Book?

Separates functionality from assurance

28
New cards

How many classes of functionality does Common Criteria have?

Nine classes including audit, communications, user data protection, identification and authentication, privacy, protection of trusted functions, resource utilization, establishing user sessions, and trusted path

29
New cards

How many classes of assurance does Common Criteria have?

Seven classes including configuration management, delivery and operation, development, guidance documents, life cycle support, tests, and vulnerability assessment

30
New cards

List Common Criteria EAL levels from lowest to highest.

• EAL1: functionally tested

• EAL2: structurally tested

• EAL3: methodologically tested and checked

• EAL4: methodologically designed tested and reviewed

• EAL5: semi-formally designed and tested

• EAL6: semi-formally verified and tested

• EAL7: formally verified design and tested

31
New cards

What are the main challenges in quantitative security measurement?

• What security metrics are meaningful and useful

• How to collect security metrics

• How to compose enterprise-level security metrics

• How to present security metrics clearly

32
New cards

What is patch risk?

The risk associated with applying patches to fix vulnerabilities, including potential system malfunction, patches containing vulnerabilities, and provider trustworthiness

33
New cards

What factors determine patch risk?

• Trustworthiness of patch provider

• How long the patch has been released and verified

34
New cards

What are the three types of security scores?

• Security score for individual vulnerability (CVSS score)

• Security score for one computer with multiple vulnerabilities

• Security score for a network with multiple computers

35
New cards

What factors determine criticality of a computer?

• Location (intranet, DMZ, internet)

• Service (HTTP, FTP, SSH)

• Role (Firewall, Desktop, Router)

• Asset (database, financial files)

36
New cards

What is the purpose of time series in security metrics?

To show changes of security over a period and determine if security is improving or falling below thresholds

37
New cards

What factors can trigger security changes over time?

• Vulnerability changes (CVSS Temporal Metrics)

• Network configuration changes

• Security training effectiveness

• Financial problems

38
New cards

What does NVD stand for?

National Vulnerability Database

39
New cards

What does CVSS stand for?

Common Vulnerability Scoring System

40
New cards

What are the three CVSS metric groups?

• Base Metric Group

• Temporal Metric Group

• Environmental Metric Group

41
New cards

What components make up network reachability analysis?

• Network topology

• Router configuration

• Firewall rules

42
New cards

In the AHP security score composition example what is the weight distribution?

• Exploitability: 0.4 (40%)

• Impact: 0.6 (60%)

43
New cards

How is exploitability weight divided in the AHP example?

• Access Vector: 0.13333

• Access Complexity: 0.13333

• Authentication: 0.1333

44
New cards

How is impact weight divided in the AHP example?

• Confidentiality: 0.2

• Integrity: 0.2

• Availability: 0.2

45
New cards

What is a major limitation of current security metric systems?

The assumption that vulnerabilities are independent to each other, which may not be true in the real world

46
New cards

What problem exists with simple statistical aggregation of security scores?

Summary/Average/Max/Min of scores on computers are not good enough to represent network security

47
New cards

What information should be combined for better network security measurement?

Vulnerability dependent information and network reachability information

48
New cards

What challenge exists with correlated vulnerabilities?

How to obtain correlation information and how to incorporate it into security score calculations

49
New cards

What is the relationship between vulnerability Va and Vb in complex scenarios?

If vulnerability Va on computer A is a prerequisite for vulnerability Vb on computer B, the scoring method needs to account for this dependenc

Explore top flashcards