Chapter8: Using risk management tools

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Threats

Potential danger that can compromise confidentiality, integrity, and availability

2
New cards

Risk Types

Internal

External

Intellectual property theft

Software compliance

Legacy systems

3
New cards

Vulnerabilities

Default configuration

Lack of malware protection

Improper patch management

Lack of firewalls

4
New cards

Risk appetite

Amount of risk an org is willing to take on

5
New cards

Risk appetite types

Expansionary

Conservative

Neutral

6
New cards

The multiple risk management strategies

Avoidance

Mitigation

Acceptance

Transference

Cybersecurity insurance

7
New cards

Risk assessment types

Quantitative

Qualitative

8
New cards

Risk reporting

Final phase of risk assessment

9
New cards

Supply chain risk

Can be eliminated by ensuring multiple vendors

10
New cards

Vulnerability assessment

Assess the security posture of systems and networks

11
New cards

Steps in vulnerability assessments

Identify assets and capabilities

Prioritize assets based on value

Identify vulnerabilities and recommend controls to mitigate them

12
New cards

Network scanners

Arp ping scan

Syn stealth scan

port scan

service scan

OS detection

13
New cards

What do vulnerability scan include?

identifies vulnerability, misconfigurations, 

lack of security controls

14
New cards

Vulnerability scan ouput

Report with info such as list of hosts discovered and scanned

list of open ports and vulnerabilities

recommended resolutions to discovered vulnerabilities

15
New cards

footprinting

provides big picture of network

16
New cards

fingerprinting

individual system and details of each one

17
New cards

What is cleanup

last step of a pen test, remove all tracks such as

user accounts created

scripts that were added 

files, logs, and temp files created

reconfigure all settings modified

18
New cards