Podcast
Questions and Answers
What are the three important categories of threat information sources mentioned in the text?
What are the three important categories of threat information sources mentioned in the text?
Based on the 2018 DBIR, how many industry sectors were the results broken down by?
Based on the 2018 DBIR, how many industry sectors were the results broken down by?
What do the key aspects of an attack include as per the text?
What do the key aspects of an attack include as per the text?
What does the ENISA Threat Landscape Report provide a detailed breakdown of?
What does the ENISA Threat Landscape Report provide a detailed breakdown of?
Signup and view all the answers
According to Threat Horizon Report, what are the three challenging themes the major threats are broken down into?
According to Threat Horizon Report, what are the three challenging themes the major threats are broken down into?
Signup and view all the answers
What does the DBIR define as a 'breach'?
What does the DBIR define as a 'breach'?
Signup and view all the answers
What is the primary characteristic of spyware?
What is the primary characteristic of spyware?
Signup and view all the answers
Which type of attack involves using authentic-looking emails to request information from users?
Which type of attack involves using authentic-looking emails to request information from users?
Signup and view all the answers
What characterizes adware?
What characterizes adware?
Signup and view all the answers
How is a password attack defined?
How is a password attack defined?
Signup and view all the answers
What is the main goal of website exploit attacks?
What is the main goal of website exploit attacks?
Signup and view all the answers
Why is it challenging to assess future trends in cybersecurity according to the text?
Why is it challenging to assess future trends in cybersecurity according to the text?
Signup and view all the answers
What is the purpose of classifying information according to the established policy?
What is the purpose of classifying information according to the established policy?
Signup and view all the answers
Which of the following is NOT a factor considered in asset value classification?
Which of the following is NOT a factor considered in asset value classification?
Signup and view all the answers
What is the purpose of assigning a disaster recovery priority to an asset?
What is the purpose of assigning a disaster recovery priority to an asset?
Signup and view all the answers
Which of the following is NOT a factor that determines an asset's exposure level?
Which of the following is NOT a factor that determines an asset's exposure level?
Signup and view all the answers
Which of the following is NOT a category of threat sources identified in the threat identification process?
Which of the following is NOT a category of threat sources identified in the threat identification process?
Signup and view all the answers
Which of the following is an example of a hostile actor threat source?
Which of the following is an example of a hostile actor threat source?
Signup and view all the answers
What are the two components of estimating the secondary loss?
What are the two components of estimating the secondary loss?
Signup and view all the answers
What is the purpose of the Business Impact Reference Table (BIRT)?
What is the purpose of the Business Impact Reference Table (BIRT)?
Signup and view all the answers
How is the primary risk calculated?
How is the primary risk calculated?
Signup and view all the answers
How is the overall risk calculated?
How is the overall risk calculated?
Signup and view all the answers
What is the purpose of risk evaluation?
What is the purpose of risk evaluation?
Signup and view all the answers
Which of the following is NOT a component of estimating the secondary loss?
Which of the following is NOT a component of estimating the secondary loss?
Signup and view all the answers
What is the first step in the cyber attack process described in the text?
What is the first step in the cyber attack process described in the text?
Signup and view all the answers
What is the purpose of the command and control step in the cyber attack process?
What is the purpose of the command and control step in the cyber attack process?
Signup and view all the answers
What is the main purpose of a security operations center (SOC)?
What is the main purpose of a security operations center (SOC)?
Signup and view all the answers
What is the difference between an organization establishing its own SOC and outsourcing SOC services?
What is the difference between an organization establishing its own SOC and outsourcing SOC services?
Signup and view all the answers
What is the purpose of the 'Weaponization' step in the cyber attack process?
What is the purpose of the 'Weaponization' step in the cyber attack process?
Signup and view all the answers
What are controls for cybersecurity according to the text?
What are controls for cybersecurity according to the text?
Signup and view all the answers
Study Notes
Cybersecurity Threats and Risk Assessment
- Reconnaissance: determining what information is available for targeting
- Weaponization: coupling an exploit with a means of gaining access to a specific system
- Delivery: delivering a weaponized payload to a victim via various means (e.g., email, web access, USB)
- Exploit: exploiting a vulnerability to enable installation
- Installation: installing a malware package on an asset
- Command and control: creating a command and control channel to operate malware remotely
- Actions: activating a threat to achieve goals (e.g., obtaining data, doing damage, or making a ransom demand)
Security Operations Center (SOC)
- A facility that tracks and integrates multiple security inputs
- Ascertains risk, determines attack targets, contains attack impact, and recommends/executes responses
- Can be established by an organization or outsourced to a private company
Control Identification
- Data type/classification: classifying information transmitted, processed, or stored by an asset
- Asset value classification: ranking asset value (e.g., low, medium, high)
- Disaster recovery priority: ranking priority for devoting resources to recovery
- Exposure level: degree to which an asset is exposed to threats
Threat Identification
- Threat sources: environmental, business resources, hostile actors
- Threat information sources: in-house experience, security alert services, global threat surveys
- Annual surveys: Verizon Data Breach Investigations Report (DBIR), Trustwave Global Security Report, Cisco Annual Cybersecurity Report, Fortinet Threat Landscape Report
Threat Types
- Spyware: software that collects information from a computer and transmits it to another system
- Adware: advertising integrated into software, resulting in pop-up ads or browser redirection
- Phishing: digital social engineering using authentic-looking emails to request information
- Password attack: accessing an obstructed device using a captured user ID/password
- Website exploit: inserting malicious code on a web server to attack the server or user systems
Risk Assessment
- Estimating secondary loss: losses from dealing with secondary stakeholder reactions
- Secondary loss magnitude: expected losses from secondary stakeholder reactions
- Secondary loss event frequency: percentage of time a primary loss event results in a secondary loss
- Business impact reference table (BIRT): a tool for performing impact assessments
Risk Determination
- Estimating primary risk: f3 (primary loss event frequency, primary loss magnitude)
- Estimating secondary risk: f3 (secondary loss event frequency, secondary loss magnitude)
- Overall risk: f4 (primary risk, secondary risk)
Risk Evaluation
- Comparing risk analysis results with risk evaluation criteria
- Criteria developed vary significantly from one organization to another
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on data classification policies, asset value classification, and disaster recovery priorities in the context of information security.