Podcast
Questions and Answers
What is the primary goal of a threat assessment?
What is the primary goal of a threat assessment?
- To assess historical risks
- To identify and evaluate potential threats (correct)
- To review system documentation
- To perform vulnerability scans
Threat assessments are performed indefinitely over time.
Threat assessments are performed indefinitely over time.
False (B)
What are the three impacts that threats can have on information systems?
What are the three impacts that threats can have on information systems?
Confidentiality, Integrity, Availability
A threat assessment evaluates the _____ of a threat's frequency.
A threat assessment evaluates the _____ of a threat's frequency.
Which technique helps ensure that data is not modified or destroyed?
Which technique helps ensure that data is not modified or destroyed?
Match the following terms with their definitions:
Match the following terms with their definitions:
The success of a vulnerability assessment often relies on reviewing system logs and _____ trails.
The success of a vulnerability assessment often relies on reviewing system logs and _____ trails.
What is the primary function of an Intrusion Detection System (IDS)?
What is the primary function of an Intrusion Detection System (IDS)?
A host-based IDS is installed on multiple systems throughout a network.
A host-based IDS is installed on multiple systems throughout a network.
What information is recorded when auditing is enabled on a folder?
What information is recorded when auditing is enabled on a folder?
An automated system has the capability of examining logs from multiple __________.
An automated system has the capability of examining logs from multiple __________.
Match the following agents with their functions in a network-based IDS:
Match the following agents with their functions in a network-based IDS:
What is a primary purpose of implementing fault tolerance strategies?
What is a primary purpose of implementing fault tolerance strategies?
Natural threats are primarily caused by human actions.
Natural threats are primarily caused by human actions.
Name one common threat from internal sources.
Name one common threat from internal sources.
A disgruntled employee could cause __________ to data if their access is not properly controlled.
A disgruntled employee could cause __________ to data if their access is not properly controlled.
Match the following threats to their categories:
Match the following threats to their categories:
Which of the following events is categorized as a natural threat?
Which of the following events is categorized as a natural threat?
Accidental access to data by employees poses no risk to organizations.
Accidental access to data by employees poses no risk to organizations.
What should be done with a terminated employee’s user account?
What should be done with a terminated employee’s user account?
External attackers can include __________ trying to launch denial of service attacks.
External attackers can include __________ trying to launch denial of service attacks.
How frequently are automated vulnerability scans typically performed?
How frequently are automated vulnerability scans typically performed?
Internal vulnerability assessments are conducted by personnel outside the company.
Internal vulnerability assessments are conducted by personnel outside the company.
What type of assessment is typically conducted on an annual basis to evaluate security controls?
What type of assessment is typically conducted on an annual basis to evaluate security controls?
A successful __________ attack may indicate that the system is not being updated often enough.
A successful __________ attack may indicate that the system is not being updated often enough.
Match the type of assessment with its description:
Match the type of assessment with its description:
Which of the following is NOT a source for documentation review during a vulnerability assessment?
Which of the following is NOT a source for documentation review during a vulnerability assessment?
External personnel are usually less effective at quickly identifying security weaknesses than in-house staff.
External personnel are usually less effective at quickly identifying security weaknesses than in-house staff.
What practice is used to improve the effectiveness of vulnerability assessments?
What practice is used to improve the effectiveness of vulnerability assessments?
The process of evaluating security controls includes documenting incidents and __________ reports.
The process of evaluating security controls includes documenting incidents and __________ reports.
What is one of the steps taken during a vulnerability assessment?
What is one of the steps taken during a vulnerability assessment?
Which of the following is NOT one of the seven domains of a typical IT infrastructure?
Which of the following is NOT one of the seven domains of a typical IT infrastructure?
Threat modeling requires understanding both hardware and software failures in a system.
Threat modeling requires understanding both hardware and software failures in a system.
What is the first step in performing threat modeling?
What is the first step in performing threat modeling?
The seven domains of a typical IT infrastructure include the User Domain, __________ Domain, LAN Domain, and System/Application Domain.
The seven domains of a typical IT infrastructure include the User Domain, __________ Domain, LAN Domain, and System/Application Domain.
Match the following domains with their descriptions:
Match the following domains with their descriptions:
What is one best practice when evaluating threats across the seven domains?
What is one best practice when evaluating threats across the seven domains?
Internal users cannot misuse a system.
Internal users cannot misuse a system.
Name one question to ask when performing threat modeling.
Name one question to ask when performing threat modeling.
Understanding data ______ is essential to perform effective threat assessments.
Understanding data ______ is essential to perform effective threat assessments.
Which of the following best describes asset management?
Which of the following best describes asset management?
What is the main issue caused by scope creep in software development?
What is the main issue caused by scope creep in software development?
Access controls testing verifies that users have more permissions than they need for their jobs.
Access controls testing verifies that users have more permissions than they need for their jobs.
What is a 'right' in the context of access controls?
What is a 'right' in the context of access controls?
Scope creep refers to the addition of functionalities that are outside the scope of the original __________ specifications.
Scope creep refers to the addition of functionalities that are outside the scope of the original __________ specifications.
What is spear-phishing?
What is spear-phishing?
Threat modeling is a straightforward process that requires minimal effort.
Threat modeling is a straightforward process that requires minimal effort.
What are two techniques for identifying threats?
What are two techniques for identifying threats?
A lack of physical control over laptops often leads to ______ of hardware and compromised data.
A lack of physical control over laptops often leads to ______ of hardware and compromised data.
Match each type of threat with its description:
Match each type of threat with its description:
What is the final step in a threat assessment?
What is the final step in a threat assessment?
What does a threat assessment report typically include?
What does a threat assessment report typically include?
Threat modeling requires understanding the flow of data in and out of systems.
Threat modeling requires understanding the flow of data in and out of systems.
The seven domains of typical IT infrastructure include User Domain, Workstation Domain, LAN Domain, and __________ Domain.
The seven domains of typical IT infrastructure include User Domain, Workstation Domain, LAN Domain, and __________ Domain.
Which of the following is a key question to ask when performing threat modeling?
Which of the following is a key question to ask when performing threat modeling?
Internal users are exempt from misusing the system.
Internal users are exempt from misusing the system.
What is the primary purpose of asset management in threat modeling?
What is the primary purpose of asset management in threat modeling?
Understanding how __________ flows in and out of systems is crucial for threat assessment.
Understanding how __________ flows in and out of systems is crucial for threat assessment.
What is the purpose of an audit in an organization?
What is the purpose of an audit in an organization?
A policy should not disable user accounts when an employee leaves an organization.
A policy should not disable user accounts when an employee leaves an organization.
What should be done with user accounts that have not been used for six months?
What should be done with user accounts that have not been used for six months?
The ______ analysis examines the output to determine if a vulnerability exists.
The ______ analysis examines the output to determine if a vulnerability exists.
Match the following analysis types with their descriptions:
Match the following analysis types with their descriptions:
What tool can assist an auditor in determining enabled accounts not used recently?
What tool can assist an auditor in determining enabled accounts not used recently?
Personnel interviews can help assess the security knowledge of employees.
Personnel interviews can help assess the security knowledge of employees.
When is it acceptable to give out passwords according to a secure organization policy?
When is it acceptable to give out passwords according to a secure organization policy?
An audit may include checking for user accounts that haven't been used in the past ______ days.
An audit may include checking for user accounts that haven't been used in the past ______ days.
What is one method for determining the effectiveness of a firewall?
What is one method for determining the effectiveness of a firewall?
What is the primary purpose of system logs in computer systems?
What is the primary purpose of system logs in computer systems?
Audit trails only log successful user activities.
Audit trails only log successful user activities.
Name one type of event that system logs can record.
Name one type of event that system logs can record.
An audit trail attempts to log at least who, what, when, and _____ of events.
An audit trail attempts to log at least who, what, when, and _____ of events.
Which event would likely stand out immediately when reviewing system logs?
Which event would likely stand out immediately when reviewing system logs?
Automated systems can only review a single source of audit trails at a time.
Automated systems can only review a single source of audit trails at a time.
What is a key element that an audit log typically captures when auditing is enabled?
What is a key element that an audit log typically captures when auditing is enabled?
The _____ is used in Microsoft Windows to view system events.
The _____ is used in Microsoft Windows to view system events.
Match the type of log with its function:
Match the type of log with its function:
Which of the following threats are categorized as human threats?
Which of the following threats are categorized as human threats?
Name one reason why disgruntled employees can pose a threat to data security.
Name one reason why disgruntled employees can pose a threat to data security.
Employees can accidentally delete data if they have __________ access to information they do not need.
Employees can accidentally delete data if they have __________ access to information they do not need.
Match the following types of threats with their descriptions:
Match the following types of threats with their descriptions:
Which of the following is a proactive measure to mitigate internal threats?
Which of the following is a proactive measure to mitigate internal threats?
What should happen to an employee's user account after termination?
What should happen to an employee's user account after termination?
What type of Intrusion Detection System (IDS) is installed on a single system?
What type of Intrusion Detection System (IDS) is installed on a single system?
An intrusion detection system can only monitor and cannot alert users.
An intrusion detection system can only monitor and cannot alert users.
What information is included in an audit trail when file access is recorded?
What information is included in an audit trail when file access is recorded?
A network-based IDS has several monitoring agents installed throughout the __________.
A network-based IDS has several monitoring agents installed throughout the __________.
Match the agents in a network-based IDS with their respective functions:
Match the agents in a network-based IDS with their respective functions:
What is the primary focus of a vulnerability assessment?
What is the primary focus of a vulnerability assessment?
Internal human threats pose no risk to data integrity.
Internal human threats pose no risk to data integrity.
What principle ensures that users have only the access they need to perform their job?
What principle ensures that users have only the access they need to perform their job?
Failure to implement access controls can make an entire network vulnerable, leading to unauthorized ______ of data.
Failure to implement access controls can make an entire network vulnerable, leading to unauthorized ______ of data.
Match the type of threat with its example:
Match the type of threat with its example:
Which of the following describes social engineering in the context of security vulnerabilities?
Which of the following describes social engineering in the context of security vulnerabilities?
A buffer overflow attack can be reported as an internal human threat.
A buffer overflow attack can be reported as an internal human threat.
What is one method to minimize human-related vulnerabilities?
What is one method to minimize human-related vulnerabilities?
A ______ is a process conducted to evaluate the effectiveness of an organization's security controls.
A ______ is a process conducted to evaluate the effectiveness of an organization's security controls.
All users having the same rights and permissions for a network enhances security.
All users having the same rights and permissions for a network enhances security.
Understanding how data flows in and out of systems is essential for effective threat assessments.
Understanding how data flows in and out of systems is essential for effective threat assessments.
List one of the seven domains of a typical IT infrastructure.
List one of the seven domains of a typical IT infrastructure.
When performing threat assessments, it’s important to understand the system or application you’re ______.
When performing threat assessments, it’s important to understand the system or application you’re ______.
Match the following best practices to their descriptions:
Match the following best practices to their descriptions:
Who could be potential adversaries when performing threat modeling?
Who could be potential adversaries when performing threat modeling?
A successful threat assessment does not require an understanding of hardware or software failures.
A successful threat assessment does not require an understanding of hardware or software failures.
An excellent starting point for threat modeling is to use the _____ of a typical IT infrastructure.
An excellent starting point for threat modeling is to use the _____ of a typical IT infrastructure.
What is one key question to ask when performing threat modeling?
What is one key question to ask when performing threat modeling?
An audit trail can only be recorded in security logs.
An audit trail can only be recorded in security logs.
What information does an automated system have the capability of examining in audit trails?
What information does an automated system have the capability of examining in audit trails?
Windows systems use the Event Viewer to view the _____ log.
Windows systems use the Event Viewer to view the _____ log.
Match the following types of logs with their functions:
Match the following types of logs with their functions:
What type of information is typically recorded in an audit log?
What type of information is typically recorded in an audit log?
System logs are primarily concerned with monitoring user behavior.
System logs are primarily concerned with monitoring user behavior.
What is one advantage of using automated systems for reviewing audit trails?
What is one advantage of using automated systems for reviewing audit trails?
An audit trail attempts to log at least _____ elements: who, what, when, and where.
An audit trail attempts to log at least _____ elements: who, what, when, and where.
Which of the following statements about audit trails is true?
Which of the following statements about audit trails is true?
Flashcards
What is a threat assessment?
What is a threat assessment?
A threat assessment identifies and evaluates potential threats. The goal is to identify as many threats as possible, evaluate their frequency, and assess the potential impact.
When is a threat assessment performed?
When is a threat assessment performed?
A threat assessment is performed for a specific time, evaluating current threats within the existing environment.
What is a threat?
What is a threat?
A threat is any activity that represents a possible danger to confidentiality, integrity, or availability of data or systems.
How does a threat impact confidentiality?
How does a threat impact confidentiality?
Signup and view all the flashcards
How does a threat impact integrity?
How does a threat impact integrity?
Signup and view all the flashcards
How does a threat impact availability?
How does a threat impact availability?
Signup and view all the flashcards
How do access controls and encryption protect confidentiality?
How do access controls and encryption protect confidentiality?
Signup and view all the flashcards
Auditable Event
Auditable Event
Signup and view all the flashcards
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
Signup and view all the flashcards
Host-Based IDS
Host-Based IDS
Signup and view all the flashcards
Network-Based IDS
Network-Based IDS
Signup and view all the flashcards
Demilitarized Zone (DMZ)
Demilitarized Zone (DMZ)
Signup and view all the flashcards
Fault tolerance strategies
Fault tolerance strategies
Signup and view all the flashcards
Data backup
Data backup
Signup and view all the flashcards
Threat assessment.
Threat assessment.
Signup and view all the flashcards
Human threats
Human threats
Signup and view all the flashcards
Natural threats
Natural threats
Signup and view all the flashcards
Internal threats
Internal threats
Signup and view all the flashcards
Disgruntled ex-employees
Disgruntled ex-employees
Signup and view all the flashcards
Denial of service (DoS) attacks
Denial of service (DoS) attacks
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Threat Modeling
Threat Modeling
Signup and view all the flashcards
Assets
Assets
Signup and view all the flashcards
Seven Domains of a Typical IT Infrastructure
Seven Domains of a Typical IT Infrastructure
Signup and view all the flashcards
User Domain
User Domain
Signup and view all the flashcards
LAN Domain
LAN Domain
Signup and view all the flashcards
LAN-to-WAN Domain
LAN-to-WAN Domain
Signup and view all the flashcards
WAN Domain
WAN Domain
Signup and view all the flashcards
System/Application Domain
System/Application Domain
Signup and view all the flashcards
Remote Access Domain
Remote Access Domain
Signup and view all the flashcards
Automated Vulnerability Scans
Automated Vulnerability Scans
Signup and view all the flashcards
Security Audits
Security Audits
Signup and view all the flashcards
Social Engineering Tests
Social Engineering Tests
Signup and view all the flashcards
Internal Vulnerability Assessments
Internal Vulnerability Assessments
Signup and view all the flashcards
External Vulnerability Assessments
External Vulnerability Assessments
Signup and view all the flashcards
Documentation Review in VA
Documentation Review in VA
Signup and view all the flashcards
Log Analysis in VA
Log Analysis in VA
Signup and view all the flashcards
Vulnerability Scanning in VA
Vulnerability Scanning in VA
Signup and view all the flashcards
Audits and Personnel Interviews in VA
Audits and Personnel Interviews in VA
Signup and view all the flashcards
Process Analysis in VA
Process Analysis in VA
Signup and view all the flashcards
Spear-phishing
Spear-phishing
Signup and view all the flashcards
Reviewing Historical Data
Reviewing Historical Data
Signup and view all the flashcards
Threat Assessment Report
Threat Assessment Report
Signup and view all the flashcards
What is Threat Modeling?
What is Threat Modeling?
Signup and view all the flashcards
What are the Seven Domains of IT Infrastructure?
What are the Seven Domains of IT Infrastructure?
Signup and view all the flashcards
What is Asset Management in Threat Modeling?
What is Asset Management in Threat Modeling?
Signup and view all the flashcards
What are the Key Questions for Performing Threat Modeling?
What are the Key Questions for Performing Threat Modeling?
Signup and view all the flashcards
What are Best Practices for Threat Assessments Within the Seven Domains?
What are Best Practices for Threat Assessments Within the Seven Domains?
Signup and view all the flashcards
What is the User Domain?
What is the User Domain?
Signup and view all the flashcards
What is the LAN Domain?
What is the LAN Domain?
Signup and view all the flashcards
What is the LAN-to-WAN Domain?
What is the LAN-to-WAN Domain?
Signup and view all the flashcards
What is the WAN Domain?
What is the WAN Domain?
Signup and view all the flashcards
What are system logs?
What are system logs?
Signup and view all the flashcards
What are audit trails?
What are audit trails?
Signup and view all the flashcards
What is an Intrusion Detection System (IDS)?
What is an Intrusion Detection System (IDS)?
Signup and view all the flashcards
Why are system logs, audit trails, and IDS reports important?
Why are system logs, audit trails, and IDS reports important?
Signup and view all the flashcards
What is the 'System' log in Windows?
What is the 'System' log in Windows?
Signup and view all the flashcards
What are audit logs used for?
What are audit logs used for?
Signup and view all the flashcards
What are IDS outputs?
What are IDS outputs?
Signup and view all the flashcards
How are system logs, audit trails, and IDS outputs used?
How are system logs, audit trails, and IDS outputs used?
Signup and view all the flashcards
What can you find by reviewing logs, audit trails, and IDS outputs?
What can you find by reviewing logs, audit trails, and IDS outputs?
Signup and view all the flashcards
How can analyzing log data help improve security?
How can analyzing log data help improve security?
Signup and view all the flashcards
Functionality Testing
Functionality Testing
Signup and view all the flashcards
Access Controls Testing
Access Controls Testing
Signup and view all the flashcards
Scope Creep
Scope Creep
Signup and view all the flashcards
Rights vs. Permissions
Rights vs. Permissions
Signup and view all the flashcards
Administrative Models
Administrative Models
Signup and view all the flashcards
What is a security audit?
What is a security audit?
Signup and view all the flashcards
What's the difference between process analysis and output analysis in security?
What's the difference between process analysis and output analysis in security?
Signup and view all the flashcards
Explain process and output analysis with a firewall example.
Explain process and output analysis with a firewall example.
Signup and view all the flashcards
How can scripting be used in security audits?
How can scripting be used in security audits?
Signup and view all the flashcards
What are personnel interviews used for in security assessments?
What are personnel interviews used for in security assessments?
Signup and view all the flashcards
What is a common password security policy?
What is a common password security policy?
Signup and view all the flashcards
What are vulnerability scans and why are they important?
What are vulnerability scans and why are they important?
Signup and view all the flashcards
What is the purpose of a security audit?
What is the purpose of a security audit?
Signup and view all the flashcards
Why is process analysis sometimes preferred over output analysis?
Why is process analysis sometimes preferred over output analysis?
Signup and view all the flashcards
When should process analysis and output analysis be used?
When should process analysis and output analysis be used?
Signup and view all the flashcards
What are internal threats?
What are internal threats?
Signup and view all the flashcards
What are external threats?
What are external threats?
Signup and view all the flashcards
What are natural threats?
What are natural threats?
Signup and view all the flashcards
Why are disgruntled ex-employees a threat?
Why are disgruntled ex-employees a threat?
Signup and view all the flashcards
What are access controls, and why are they important?
What are access controls, and why are they important?
Signup and view all the flashcards
What are the principles of least-privilege and need-to-know?
What are the principles of least-privilege and need-to-know?
Signup and view all the flashcards
Why is asset management important in threat modeling?
Why is asset management important in threat modeling?
Signup and view all the flashcards
What key questions should you ask when performing threat modeling?
What key questions should you ask when performing threat modeling?
Signup and view all the flashcards
What are some best practices for threat assessments within the Seven Domains?
What are some best practices for threat assessments within the Seven Domains?
Signup and view all the flashcards
What is the User Domain in IT Infrastructure?
What is the User Domain in IT Infrastructure?
Signup and view all the flashcards
What is the LAN Domain in IT Infrastructure?
What is the LAN Domain in IT Infrastructure?
Signup and view all the flashcards
What is the LAN-to-WAN Domain in IT Infrastructure?
What is the LAN-to-WAN Domain in IT Infrastructure?
Signup and view all the flashcards
What is the WAN Domain in IT Infrastructure?
What is the WAN Domain in IT Infrastructure?
Signup and view all the flashcards
What is a vulnerability assessment?
What is a vulnerability assessment?
Signup and view all the flashcards
What is a buffer overflow attack?
What is a buffer overflow attack?
Signup and view all the flashcards
What are access controls?
What are access controls?
Signup and view all the flashcards
What is the principle of least privilege?
What is the principle of least privilege?
Signup and view all the flashcards
What is social engineering?
What is social engineering?
Signup and view all the flashcards
Who or what can be assessed in a vulnerability assessment?
Who or what can be assessed in a vulnerability assessment?
Signup and view all the flashcards
What is the 'need to know' principle?
What is the 'need to know' principle?
Signup and view all the flashcards
What are administrative models?
What are administrative models?
Signup and view all the flashcards
How can personnel be vulnerable?
How can personnel be vulnerable?
Signup and view all the flashcards
Why are vulnerability assessments performed?
Why are vulnerability assessments performed?
Signup and view all the flashcards
What are auditable events?
What are auditable events?
Signup and view all the flashcards
What does an Intrusion Detection System (IDS) do?
What does an Intrusion Detection System (IDS) do?
Signup and view all the flashcards
What's the difference between a Host-Based IDS and a Network-Based IDS?
What's the difference between a Host-Based IDS and a Network-Based IDS?
Signup and view all the flashcards
What is a Demilitarized Zone (DMZ) in network security?
What is a Demilitarized Zone (DMZ) in network security?
Signup and view all the flashcards
Why is analyzing intrusion detection system (IDS) outputs important?
Why is analyzing intrusion detection system (IDS) outputs important?
Signup and view all the flashcards
What is functionality testing?
What is functionality testing?
Signup and view all the flashcards
Study Notes
Security Risk Management and Ethics
- Chapter Four focuses on identifying and analyzing threats, vulnerabilities, and exploits.
- The chapter covers threat assessments, vulnerability assessments, and exploit assessments.
- The goals of the chapter include describing threat identification techniques, listing best practices for threat assessments across seven IT infrastructure domains, explaining the value of reviewing documentation and system logs for vulnerability assessment.
- Identifying tools for vulnerability scans, best practices for vulnerability assessments, and identifying exploits throughout the seven domains of a typical IT infrastructure are also goals.
Threat Assessments
- A threat assessment identifies and evaluates potential threats.
- The goal is to identify as many potential threats as possible and then evaluate each threat to determine likelihood of occurrence.
- The frequency of a threat is important.
- A threat assessment is conducted at a specific point in time, as risks can change.
- The assessment considers existing threats in the current environment.
Threat Assessments (Continued)
- Threats represent potential dangers (human actions, environmental factors, and external threats).
- Impacts on confidentiality (unauthorized disclosure), integrity (modification or destruction of data), and availability (service or system unavailability) are considered.
- Human threats can be internal (e.g., disgruntled employees) or external (e.g., hackers, malware writers, terrorists).
- Natural threats include various weather events (floods, earthquakes, tornados, storms), and fires.
- Employee actions (malicious or accidental) can compromise data.
- Unintentional access, data deletion, and forwarding of viruses are internal threats.
- Lack of laptop security control (theft and data compromise) is an internal threat.
- External actors can launch denial-of-service (DoS) attacks, create malware, and attempt to access, modify, or corrupt organizational data. Terrorists can also launch attacks.
The Top Threats are Internal
- Internal threats can be unintentional (e.g., accidental access or data deletion) or malicious (e.g., disgruntled employee actions).
- Access controls, authentication processes, and least-privilege and need-to-know policies are crucial components to minimize the threat of unintentional or malicious user activity.
- Ex-employee access accounts should be disabled or deleted post-termination to prevent unauthorized access.
- Phishing attempts, often sophisticated, can target specific companies and trick users, appearing as if they originate from within the company.
- Virus forwarding (inadvertent sharing of malicious emails), and lack of laptop security (theft and data compromise) are internal threats.
Threat Assessments (Continued)
- Historical data analysis and threat modeling are fundamental to identifying potential threats.
- Historical data analysis includes reviewing previous incidents in an organization, similar organizations, and the local area (including weather events) to determine threats from various sources.
- Different types of historical/organizational data can be examined, including security records, insurance claims, troubleshooting records, and employee interviews.
Threat Modeling
- Threat modeling is a method for evaluating and documenting security risks within applications or systems.
- This process should ideally occur before application development or system deployment to avoid scope creep.
Threat Modeling (Continued)
- It's essential during the initial stages of a system's life-cycle to identify valuable assets, which helps to develop appropriate security measures.
- The seven domains of IT infrastructure (User, Workstation, LAN, LAN-to-WAN, WAN, Remote Access, and System/Application) are important in threat modeling analysis.
Vulnerability Assessments
- A vulnerability assessment (VA) is performed to identify weaknesses within an IT infrastructure, or the personnel involved, or the network itself.
- These weaknesses may lead to security violations.
- Vulnerabilities can exist at the personnel, network, or specific server level.
Vulnerability Assessments (Continued)
- Vulnerabilities exist if access controls are not properly implemented or security awareness is lacking in personnel or processes.
- Social engineering tactics (misinformation or manipulation to gain access to sensitive data) also create vulnerabilities.
- Regular assessments are recommended to detect emerging or recurring vulnerabilities.
Vulnerability Assessment (Continued)
- Automated scans (e.g., Nmap, Nessus, SATAN, SAINT) are important to quickly identify vulnerabilities.
- Audits and personnel interviews help to check for policy compliance and security knowledge.
- Policies related to employee departures (disabling/deleting user accounts after they leave) are also checked as part of the audit processes.
- Process and output analysis are used to identify inherent vulnerabilities.
- System testing is important to discover vulnerabilities related to patches and updates of operational systems or programs.
- Functionality testing will evaluate the adherence to the initial specifications.
- Access controls testing verifies that user permissions and privileges are in accordance with the organization's policies. This will also include access restrictions (by grouping employees) based on their department.
Vulnerability Assessment (Continued)
- Penetration testing is another method to test and uncover vulnerabilities.
- The goal is to evaluate the effectiveness of security controls against specific known vulnerabilities. A penetration test can detect the effectiveness of controls implemented against certain vulnerabilities, which include checking for vulnerabilities from inside or outside a network, and using a DMZ.
- Appropriate and detailed documentation of results must occur for compliance and improvement.
Best Practices: Vulnerability Assessments
- Maintaining up-to-date vulnerability scanners enhances the success of assessments.
- Performing internal and external checks helps in detecting vulnerabilities from various locations (within a network or outside), and from a DMZ.
- Documenting vulnerability assessment results is crucial for tracking progress, compliance, reporting, and security improvements.
Documentation Review
- Documentation review includes reviewing incident reports, outage reports, and past assessment reports.
- It helps identify vulnerabilities, common problems, and areas needing improvements and correction.
Review of System Logs, Audit Trails, and Intrusion Detection System Outputs
- System logs, audit trails, and intrusion detection system (IDS) outputs provide information for vulnerability discovery.
- Auditing of events (actions) provides detailed information on who accessed, what was accessed, when, and where. This may include who attempted to log in to a resource or what files were accessed.
- An IDS detects intrusions and alerts administrators to security issues.
- Events from an intrusion detection system (IDS) can detail attack patterns launched against a network. Attacks from a DMZ, the Internet, and internal networks can be identified.
- IDS's usually consist of multiple agents, often one outside a firewall, one within a DMZ, and one within the internal network.
Other Assessment Tools
- Review historical data, perform threat modeling, and analyze tools (including Nmap, Nessus, SATAN, and SAINT) to identify and respond to threats and vulnerabilities.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers Chapter Four of Security Risk Management, which focuses on identifying and analyzing threats, vulnerabilities, and exploits. It discusses assessment techniques, best practices, and the importance of documentation and system logs in the assessment process. Test your knowledge on threat assessments across various IT infrastructure domains.