Chapter 22

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Vulnerability Management

Systematic and ongoing process of identifying, evaluating, prioritizing, and mitigating vulnerabilities

2
New cards

Vulnerability Scanning

Automated method of probing networks, systems, and applications to discover potential vulnerabilities

3
New cards

Application Security

used to safeguard the software from being manipulated during its lifecycle

4
New cards

Static Analysis

used to analyze an application's source code without executing it

5
New cards

Dynamic Analysis

Evaluates an application as it is being run to determine if there are any vulnerabilities in the application

6
New cards

Package Monitoring

Ensures that the libraries and components that the application depends on are secure and up-to-date

7
New cards

Penetration Testing

Used to simulate a real-world attack on a system to evaluate its security posture

8
New cards

System/process audit

An audit process with a wide scope, including assessment of supply chain, configuration, support, monitoring, and cybersecurity factors.

9
New cards

What are the 4 steps to identify vulnerabilities?

1) Planning

2) Testing

3) Implementing

4) Auditing

10
New cards

What are the different methods?

-Vulnerability scanning

-application security techniques

-penetration testing

-security and process auditing

11
New cards

Threat Intelligence

Continual process used to understand the threats faced by an organization

12
New cards

Threat Intelligence Feed

Continuous stream of data related to potential or current threats to an organization's security

13
New cards

Open-Source Intelligence (OSINT)

Intelligence that is collected from publicly available sources including reports, forums, news articles, blogs, and social media posts

14
New cards

proprietary or third-party feeds

Threat intelligence feeds that are provided by commercial vendors, usually under a subscription service type of business model

15
New cards

Responsible Disclosure

Term used to describe the ethical practice where a security researcher discloses information about vulnerabilities in a software, hardware, or online service

16
New cards

Bug Bounties

Offer rewards to researchers who discover vulnerabilities, encourages responsible disclosure

- enhances cybersecurity collabs for a safer digital landscape

17
New cards

Common Vulnerabilities and Exposures (CVE)

System that provides a standardized way to uniquely identify and reference known vulnerabilities in software and hardware

18
New cards

Exposure Factor (EF)

Used as a quantifiable metric to help a cybersecurity professional understand the exact percentage of an asset that is likely to be damaged or affected if a particular vulnerability is exploited

19
New cards

Steps to finding vulnerabilities

- confirmation (false positive, etc)

- prioritization

- classification

- organizational impact

- exposure factor

- risk tolerance

20
New cards

vulnerability response and remediation

Strategies that identify, assess, and address vulnerabilities in a system or network to strengthen an organization's security posture

21
New cards

Patching

Applying updates to fix vulnerabilities.

22
New cards

Purchasing Cybersecurity Insurance Policies

Procuring insurance policies to mitigate financial losses from cyber incidents

23
New cards

Network Segmentation

Dividing a network into smaller, manageable parts.

24
New cards

implementing compensating controls

Alternative security measures is used for situations where standard controls are not feasible or effective

25
New cards

exception

temporarily relaxes security controls for operational business needs

26
New cards

exemption

permanently waives controls for specific reasons such as when using a legacy system