1/16
Flashcards covering key concepts from Chapter 12: Assessing System Security, including risk management, security evaluation, assessment techniques, and documentation.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is the formula for Single Loss Expectancy (SLE)?
SLE = Asset Value (AV) x Exposure Factor (EF)
What does Exposure Factor (EF) represent in SLE calculation?
Percentage of the asset's value expected to be lost.
What is the formula for Annualized Loss Expectancy (ALE)?
ALE = Single Loss Expectancy (SLE) x Annual Rate of Occurrence (ARO)
Define Residual Risk
Risk remaining after implementing all possible risk mitigation steps.
List four categories of response to risk.
Mitigation, Avoidance, Transference, Acceptance
What three factors are used to calculate a numeric value for a system's security risk?
Attractiveness to attackers, Nature of information, Level of security
What is the formula to calculate a system's security rating (R)?
(Attractiveness (A) + Information content (I)) – Security (S) = Rating (R)
According to the lecture, what are the Six P's of Assessment?
Patches, Ports, Protect, Policies, Probe, Physical
Why is it important to have a patch policy?
To ensure patches are applied correctly and consistently
What security measures should be in place to protect a network?
Firewall, Antivirus, Antispyware, IDS, Proxy server or NAT, Data transmission encryption
What security steps should be taken regarding physical access to a network?
Control access to server rooms, workstations, miscellaneous equipment, and backup media.
What are the key actions when probing a network?
Port scanning, Enumerating, Vulnerability assessment
List some tools used for probing a network.
NetCop, NetBrute, Cerberus, SATAN, SAINT, Nessus, NetStat/NetStat Live, Active Ports, Microsoft Baseline Security Analyzer, NSAuditor, NMAP
What is the purpose of vulnerability lists like CVE and OWASP?
To provide a standardized way to identify and track known vulnerabilities.
What are the three dimensions of the McCumber Cube?
Goals (Confidentiality, Integrity, Availability), Information States (Storage, Transmission, Processing), Safeguards (Policy and Practices, Human Factors, Technology)
What types of security documentation are important to maintain?
Physical security, Policy and personnel, Probe documents, Network protection documents
What needs to be checked during a security audit?
Appropriate security policies, Patch levels and updates, Physical security, System vulnerabilities