Chapter 12: Assessing System Security Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts from Chapter 12: Assessing System Security, including risk management, security evaluation, assessment techniques, and documentation.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

What is the formula for Single Loss Expectancy (SLE)?

SLE = Asset Value (AV) x Exposure Factor (EF)

2
New cards

What does Exposure Factor (EF) represent in SLE calculation?

Percentage of the asset's value expected to be lost.

3
New cards

What is the formula for Annualized Loss Expectancy (ALE)?

ALE = Single Loss Expectancy (SLE) x Annual Rate of Occurrence (ARO)

4
New cards

Define Residual Risk

Risk remaining after implementing all possible risk mitigation steps.

5
New cards

List four categories of response to risk.

Mitigation, Avoidance, Transference, Acceptance

6
New cards

What three factors are used to calculate a numeric value for a system's security risk?

Attractiveness to attackers, Nature of information, Level of security

7
New cards

What is the formula to calculate a system's security rating (R)?

(Attractiveness (A) + Information content (I)) – Security (S) = Rating (R)

8
New cards

According to the lecture, what are the Six P's of Assessment?

Patches, Ports, Protect, Policies, Probe, Physical

9
New cards

Why is it important to have a patch policy?

To ensure patches are applied correctly and consistently

10
New cards

What security measures should be in place to protect a network?

Firewall, Antivirus, Antispyware, IDS, Proxy server or NAT, Data transmission encryption

11
New cards

What security steps should be taken regarding physical access to a network?

Control access to server rooms, workstations, miscellaneous equipment, and backup media.

12
New cards

What are the key actions when probing a network?

Port scanning, Enumerating, Vulnerability assessment

13
New cards

List some tools used for probing a network.

NetCop, NetBrute, Cerberus, SATAN, SAINT, Nessus, NetStat/NetStat Live, Active Ports, Microsoft Baseline Security Analyzer, NSAuditor, NMAP

14
New cards

What is the purpose of vulnerability lists like CVE and OWASP?

To provide a standardized way to identify and track known vulnerabilities.

15
New cards

What are the three dimensions of the McCumber Cube?

Goals (Confidentiality, Integrity, Availability), Information States (Storage, Transmission, Processing), Safeguards (Policy and Practices, Human Factors, Technology)

16
New cards

What types of security documentation are important to maintain?

Physical security, Policy and personnel, Probe documents, Network protection documents

17
New cards

What needs to be checked during a security audit?

Appropriate security policies, Patch levels and updates, Physical security, System vulnerabilities