Podcast
Questions and Answers
What is the primary goal of a threat assessment?
What is the primary goal of a threat assessment?
Threat assessments are performed indefinitely over time.
Threat assessments are performed indefinitely over time.
False
What are the three impacts that threats can have on information systems?
What are the three impacts that threats can have on information systems?
Confidentiality, Integrity, Availability
A threat assessment evaluates the _____ of a threat's frequency.
A threat assessment evaluates the _____ of a threat's frequency.
Signup and view all the answers
Which technique helps ensure that data is not modified or destroyed?
Which technique helps ensure that data is not modified or destroyed?
Signup and view all the answers
Match the following terms with their definitions:
Match the following terms with their definitions:
Signup and view all the answers
The success of a vulnerability assessment often relies on reviewing system logs and _____ trails.
The success of a vulnerability assessment often relies on reviewing system logs and _____ trails.
Signup and view all the answers
What is the primary function of an Intrusion Detection System (IDS)?
What is the primary function of an Intrusion Detection System (IDS)?
Signup and view all the answers
A host-based IDS is installed on multiple systems throughout a network.
A host-based IDS is installed on multiple systems throughout a network.
Signup and view all the answers
What information is recorded when auditing is enabled on a folder?
What information is recorded when auditing is enabled on a folder?
Signup and view all the answers
An automated system has the capability of examining logs from multiple __________.
An automated system has the capability of examining logs from multiple __________.
Signup and view all the answers
Match the following agents with their functions in a network-based IDS:
Match the following agents with their functions in a network-based IDS:
Signup and view all the answers
What is a primary purpose of implementing fault tolerance strategies?
What is a primary purpose of implementing fault tolerance strategies?
Signup and view all the answers
Natural threats are primarily caused by human actions.
Natural threats are primarily caused by human actions.
Signup and view all the answers
Name one common threat from internal sources.
Name one common threat from internal sources.
Signup and view all the answers
A disgruntled employee could cause __________ to data if their access is not properly controlled.
A disgruntled employee could cause __________ to data if their access is not properly controlled.
Signup and view all the answers
Match the following threats to their categories:
Match the following threats to their categories:
Signup and view all the answers
Which of the following events is categorized as a natural threat?
Which of the following events is categorized as a natural threat?
Signup and view all the answers
Accidental access to data by employees poses no risk to organizations.
Accidental access to data by employees poses no risk to organizations.
Signup and view all the answers
What should be done with a terminated employee’s user account?
What should be done with a terminated employee’s user account?
Signup and view all the answers
External attackers can include __________ trying to launch denial of service attacks.
External attackers can include __________ trying to launch denial of service attacks.
Signup and view all the answers
How frequently are automated vulnerability scans typically performed?
How frequently are automated vulnerability scans typically performed?
Signup and view all the answers
Internal vulnerability assessments are conducted by personnel outside the company.
Internal vulnerability assessments are conducted by personnel outside the company.
Signup and view all the answers
What type of assessment is typically conducted on an annual basis to evaluate security controls?
What type of assessment is typically conducted on an annual basis to evaluate security controls?
Signup and view all the answers
A successful __________ attack may indicate that the system is not being updated often enough.
A successful __________ attack may indicate that the system is not being updated often enough.
Signup and view all the answers
Match the type of assessment with its description:
Match the type of assessment with its description:
Signup and view all the answers
Which of the following is NOT a source for documentation review during a vulnerability assessment?
Which of the following is NOT a source for documentation review during a vulnerability assessment?
Signup and view all the answers
External personnel are usually less effective at quickly identifying security weaknesses than in-house staff.
External personnel are usually less effective at quickly identifying security weaknesses than in-house staff.
Signup and view all the answers
What practice is used to improve the effectiveness of vulnerability assessments?
What practice is used to improve the effectiveness of vulnerability assessments?
Signup and view all the answers
The process of evaluating security controls includes documenting incidents and __________ reports.
The process of evaluating security controls includes documenting incidents and __________ reports.
Signup and view all the answers
What is one of the steps taken during a vulnerability assessment?
What is one of the steps taken during a vulnerability assessment?
Signup and view all the answers
Which of the following is NOT one of the seven domains of a typical IT infrastructure?
Which of the following is NOT one of the seven domains of a typical IT infrastructure?
Signup and view all the answers
Threat modeling requires understanding both hardware and software failures in a system.
Threat modeling requires understanding both hardware and software failures in a system.
Signup and view all the answers
What is the first step in performing threat modeling?
What is the first step in performing threat modeling?
Signup and view all the answers
The seven domains of a typical IT infrastructure include the User Domain, __________ Domain, LAN Domain, and System/Application Domain.
The seven domains of a typical IT infrastructure include the User Domain, __________ Domain, LAN Domain, and System/Application Domain.
Signup and view all the answers
Match the following domains with their descriptions:
Match the following domains with their descriptions:
Signup and view all the answers
What is one best practice when evaluating threats across the seven domains?
What is one best practice when evaluating threats across the seven domains?
Signup and view all the answers
Internal users cannot misuse a system.
Internal users cannot misuse a system.
Signup and view all the answers
Name one question to ask when performing threat modeling.
Name one question to ask when performing threat modeling.
Signup and view all the answers
Understanding data ______ is essential to perform effective threat assessments.
Understanding data ______ is essential to perform effective threat assessments.
Signup and view all the answers
Which of the following best describes asset management?
Which of the following best describes asset management?
Signup and view all the answers
Signup and view all the answers
What is the main issue caused by scope creep in software development?
What is the main issue caused by scope creep in software development?
Signup and view all the answers
Access controls testing verifies that users have more permissions than they need for their jobs.
Access controls testing verifies that users have more permissions than they need for their jobs.
Signup and view all the answers
What is a 'right' in the context of access controls?
What is a 'right' in the context of access controls?
Signup and view all the answers
Scope creep refers to the addition of functionalities that are outside the scope of the original __________ specifications.
Scope creep refers to the addition of functionalities that are outside the scope of the original __________ specifications.
Signup and view all the answers
What is spear-phishing?
What is spear-phishing?
Signup and view all the answers
Threat modeling is a straightforward process that requires minimal effort.
Threat modeling is a straightforward process that requires minimal effort.
Signup and view all the answers
What are two techniques for identifying threats?
What are two techniques for identifying threats?
Signup and view all the answers
A lack of physical control over laptops often leads to ______ of hardware and compromised data.
A lack of physical control over laptops often leads to ______ of hardware and compromised data.
Signup and view all the answers
Match each type of threat with its description:
Match each type of threat with its description:
Signup and view all the answers
What is the final step in a threat assessment?
What is the final step in a threat assessment?
Signup and view all the answers
What does a threat assessment report typically include?
What does a threat assessment report typically include?
Signup and view all the answers
Threat modeling requires understanding the flow of data in and out of systems.
Threat modeling requires understanding the flow of data in and out of systems.
Signup and view all the answers
The seven domains of typical IT infrastructure include User Domain, Workstation Domain, LAN Domain, and __________ Domain.
The seven domains of typical IT infrastructure include User Domain, Workstation Domain, LAN Domain, and __________ Domain.
Signup and view all the answers
Which of the following is a key question to ask when performing threat modeling?
Which of the following is a key question to ask when performing threat modeling?
Signup and view all the answers
Internal users are exempt from misusing the system.
Internal users are exempt from misusing the system.
Signup and view all the answers
What is the primary purpose of asset management in threat modeling?
What is the primary purpose of asset management in threat modeling?
Signup and view all the answers
Understanding how __________ flows in and out of systems is crucial for threat assessment.
Understanding how __________ flows in and out of systems is crucial for threat assessment.
Signup and view all the answers
What is the purpose of an audit in an organization?
What is the purpose of an audit in an organization?
Signup and view all the answers
A policy should not disable user accounts when an employee leaves an organization.
A policy should not disable user accounts when an employee leaves an organization.
Signup and view all the answers
What should be done with user accounts that have not been used for six months?
What should be done with user accounts that have not been used for six months?
Signup and view all the answers
The ______ analysis examines the output to determine if a vulnerability exists.
The ______ analysis examines the output to determine if a vulnerability exists.
Signup and view all the answers
Match the following analysis types with their descriptions:
Match the following analysis types with their descriptions:
Signup and view all the answers
What tool can assist an auditor in determining enabled accounts not used recently?
What tool can assist an auditor in determining enabled accounts not used recently?
Signup and view all the answers
Personnel interviews can help assess the security knowledge of employees.
Personnel interviews can help assess the security knowledge of employees.
Signup and view all the answers
When is it acceptable to give out passwords according to a secure organization policy?
When is it acceptable to give out passwords according to a secure organization policy?
Signup and view all the answers
An audit may include checking for user accounts that haven't been used in the past ______ days.
An audit may include checking for user accounts that haven't been used in the past ______ days.
Signup and view all the answers
What is one method for determining the effectiveness of a firewall?
What is one method for determining the effectiveness of a firewall?
Signup and view all the answers
What is the primary purpose of system logs in computer systems?
What is the primary purpose of system logs in computer systems?
Signup and view all the answers
Audit trails only log successful user activities.
Audit trails only log successful user activities.
Signup and view all the answers
Name one type of event that system logs can record.
Name one type of event that system logs can record.
Signup and view all the answers
An audit trail attempts to log at least who, what, when, and _____ of events.
An audit trail attempts to log at least who, what, when, and _____ of events.
Signup and view all the answers
Which event would likely stand out immediately when reviewing system logs?
Which event would likely stand out immediately when reviewing system logs?
Signup and view all the answers
Automated systems can only review a single source of audit trails at a time.
Automated systems can only review a single source of audit trails at a time.
Signup and view all the answers
What is a key element that an audit log typically captures when auditing is enabled?
What is a key element that an audit log typically captures when auditing is enabled?
Signup and view all the answers
The _____ is used in Microsoft Windows to view system events.
The _____ is used in Microsoft Windows to view system events.
Signup and view all the answers
Match the type of log with its function:
Match the type of log with its function:
Signup and view all the answers
Which of the following threats are categorized as human threats?
Which of the following threats are categorized as human threats?
Signup and view all the answers
Name one reason why disgruntled employees can pose a threat to data security.
Name one reason why disgruntled employees can pose a threat to data security.
Signup and view all the answers
Employees can accidentally delete data if they have __________ access to information they do not need.
Employees can accidentally delete data if they have __________ access to information they do not need.
Signup and view all the answers
Match the following types of threats with their descriptions:
Match the following types of threats with their descriptions:
Signup and view all the answers
Which of the following is a proactive measure to mitigate internal threats?
Which of the following is a proactive measure to mitigate internal threats?
Signup and view all the answers
What should happen to an employee's user account after termination?
What should happen to an employee's user account after termination?
Signup and view all the answers
What type of Intrusion Detection System (IDS) is installed on a single system?
What type of Intrusion Detection System (IDS) is installed on a single system?
Signup and view all the answers
An intrusion detection system can only monitor and cannot alert users.
An intrusion detection system can only monitor and cannot alert users.
Signup and view all the answers
What information is included in an audit trail when file access is recorded?
What information is included in an audit trail when file access is recorded?
Signup and view all the answers
A network-based IDS has several monitoring agents installed throughout the __________.
A network-based IDS has several monitoring agents installed throughout the __________.
Signup and view all the answers
Match the agents in a network-based IDS with their respective functions:
Match the agents in a network-based IDS with their respective functions:
Signup and view all the answers
What is the primary focus of a vulnerability assessment?
What is the primary focus of a vulnerability assessment?
Signup and view all the answers
Internal human threats pose no risk to data integrity.
Internal human threats pose no risk to data integrity.
Signup and view all the answers
What principle ensures that users have only the access they need to perform their job?
What principle ensures that users have only the access they need to perform their job?
Signup and view all the answers
Failure to implement access controls can make an entire network vulnerable, leading to unauthorized ______ of data.
Failure to implement access controls can make an entire network vulnerable, leading to unauthorized ______ of data.
Signup and view all the answers
Match the type of threat with its example:
Match the type of threat with its example:
Signup and view all the answers
Which of the following describes social engineering in the context of security vulnerabilities?
Which of the following describes social engineering in the context of security vulnerabilities?
Signup and view all the answers
A buffer overflow attack can be reported as an internal human threat.
A buffer overflow attack can be reported as an internal human threat.
Signup and view all the answers
What is one method to minimize human-related vulnerabilities?
What is one method to minimize human-related vulnerabilities?
Signup and view all the answers
A ______ is a process conducted to evaluate the effectiveness of an organization's security controls.
A ______ is a process conducted to evaluate the effectiveness of an organization's security controls.
Signup and view all the answers
All users having the same rights and permissions for a network enhances security.
All users having the same rights and permissions for a network enhances security.
Signup and view all the answers
Understanding how data flows in and out of systems is essential for effective threat assessments.
Understanding how data flows in and out of systems is essential for effective threat assessments.
Signup and view all the answers
List one of the seven domains of a typical IT infrastructure.
List one of the seven domains of a typical IT infrastructure.
Signup and view all the answers
When performing threat assessments, it’s important to understand the system or application you’re ______.
When performing threat assessments, it’s important to understand the system or application you’re ______.
Signup and view all the answers
Match the following best practices to their descriptions:
Match the following best practices to their descriptions:
Signup and view all the answers
Who could be potential adversaries when performing threat modeling?
Who could be potential adversaries when performing threat modeling?
Signup and view all the answers
A successful threat assessment does not require an understanding of hardware or software failures.
A successful threat assessment does not require an understanding of hardware or software failures.
Signup and view all the answers
An excellent starting point for threat modeling is to use the _____ of a typical IT infrastructure.
An excellent starting point for threat modeling is to use the _____ of a typical IT infrastructure.
Signup and view all the answers
What is one key question to ask when performing threat modeling?
What is one key question to ask when performing threat modeling?
Signup and view all the answers
An audit trail can only be recorded in security logs.
An audit trail can only be recorded in security logs.
Signup and view all the answers
What information does an automated system have the capability of examining in audit trails?
What information does an automated system have the capability of examining in audit trails?
Signup and view all the answers
Windows systems use the Event Viewer to view the _____ log.
Windows systems use the Event Viewer to view the _____ log.
Signup and view all the answers
Match the following types of logs with their functions:
Match the following types of logs with their functions:
Signup and view all the answers
What type of information is typically recorded in an audit log?
What type of information is typically recorded in an audit log?
Signup and view all the answers
System logs are primarily concerned with monitoring user behavior.
System logs are primarily concerned with monitoring user behavior.
Signup and view all the answers
What is one advantage of using automated systems for reviewing audit trails?
What is one advantage of using automated systems for reviewing audit trails?
Signup and view all the answers
An audit trail attempts to log at least _____ elements: who, what, when, and where.
An audit trail attempts to log at least _____ elements: who, what, when, and where.
Signup and view all the answers
Which of the following statements about audit trails is true?
Which of the following statements about audit trails is true?
Signup and view all the answers
Study Notes
Security Risk Management and Ethics
- Chapter Four focuses on identifying and analyzing threats, vulnerabilities, and exploits.
- The chapter covers threat assessments, vulnerability assessments, and exploit assessments.
- The goals of the chapter include describing threat identification techniques, listing best practices for threat assessments across seven IT infrastructure domains, explaining the value of reviewing documentation and system logs for vulnerability assessment.
- Identifying tools for vulnerability scans, best practices for vulnerability assessments, and identifying exploits throughout the seven domains of a typical IT infrastructure are also goals.
Threat Assessments
- A threat assessment identifies and evaluates potential threats.
- The goal is to identify as many potential threats as possible and then evaluate each threat to determine likelihood of occurrence.
- The frequency of a threat is important.
- A threat assessment is conducted at a specific point in time, as risks can change.
- The assessment considers existing threats in the current environment.
Threat Assessments (Continued)
- Threats represent potential dangers (human actions, environmental factors, and external threats).
- Impacts on confidentiality (unauthorized disclosure), integrity (modification or destruction of data), and availability (service or system unavailability) are considered.
- Human threats can be internal (e.g., disgruntled employees) or external (e.g., hackers, malware writers, terrorists).
- Natural threats include various weather events (floods, earthquakes, tornados, storms), and fires.
- Employee actions (malicious or accidental) can compromise data.
- Unintentional access, data deletion, and forwarding of viruses are internal threats.
- Lack of laptop security control (theft and data compromise) is an internal threat.
- External actors can launch denial-of-service (DoS) attacks, create malware, and attempt to access, modify, or corrupt organizational data. Terrorists can also launch attacks.
The Top Threats are Internal
- Internal threats can be unintentional (e.g., accidental access or data deletion) or malicious (e.g., disgruntled employee actions).
- Access controls, authentication processes, and least-privilege and need-to-know policies are crucial components to minimize the threat of unintentional or malicious user activity.
- Ex-employee access accounts should be disabled or deleted post-termination to prevent unauthorized access.
- Phishing attempts, often sophisticated, can target specific companies and trick users, appearing as if they originate from within the company.
- Virus forwarding (inadvertent sharing of malicious emails), and lack of laptop security (theft and data compromise) are internal threats.
Threat Assessments (Continued)
- Historical data analysis and threat modeling are fundamental to identifying potential threats.
- Historical data analysis includes reviewing previous incidents in an organization, similar organizations, and the local area (including weather events) to determine threats from various sources.
- Different types of historical/organizational data can be examined, including security records, insurance claims, troubleshooting records, and employee interviews.
Threat Modeling
- Threat modeling is a method for evaluating and documenting security risks within applications or systems.
- This process should ideally occur before application development or system deployment to avoid scope creep.
Threat Modeling (Continued)
- It's essential during the initial stages of a system's life-cycle to identify valuable assets, which helps to develop appropriate security measures.
- The seven domains of IT infrastructure (User, Workstation, LAN, LAN-to-WAN, WAN, Remote Access, and System/Application) are important in threat modeling analysis.
Vulnerability Assessments
- A vulnerability assessment (VA) is performed to identify weaknesses within an IT infrastructure, or the personnel involved, or the network itself.
- These weaknesses may lead to security violations.
- Vulnerabilities can exist at the personnel, network, or specific server level.
Vulnerability Assessments (Continued)
- Vulnerabilities exist if access controls are not properly implemented or security awareness is lacking in personnel or processes.
- Social engineering tactics (misinformation or manipulation to gain access to sensitive data) also create vulnerabilities.
- Regular assessments are recommended to detect emerging or recurring vulnerabilities.
Vulnerability Assessment (Continued)
- Automated scans (e.g., Nmap, Nessus, SATAN, SAINT) are important to quickly identify vulnerabilities.
- Audits and personnel interviews help to check for policy compliance and security knowledge.
- Policies related to employee departures (disabling/deleting user accounts after they leave) are also checked as part of the audit processes.
- Process and output analysis are used to identify inherent vulnerabilities.
- System testing is important to discover vulnerabilities related to patches and updates of operational systems or programs.
- Functionality testing will evaluate the adherence to the initial specifications.
- Access controls testing verifies that user permissions and privileges are in accordance with the organization's policies. This will also include access restrictions (by grouping employees) based on their department.
Vulnerability Assessment (Continued)
- Penetration testing is another method to test and uncover vulnerabilities.
- The goal is to evaluate the effectiveness of security controls against specific known vulnerabilities. A penetration test can detect the effectiveness of controls implemented against certain vulnerabilities, which include checking for vulnerabilities from inside or outside a network, and using a DMZ.
- Appropriate and detailed documentation of results must occur for compliance and improvement.
Best Practices: Vulnerability Assessments
- Maintaining up-to-date vulnerability scanners enhances the success of assessments.
- Performing internal and external checks helps in detecting vulnerabilities from various locations (within a network or outside), and from a DMZ.
- Documenting vulnerability assessment results is crucial for tracking progress, compliance, reporting, and security improvements.
Documentation Review
- Documentation review includes reviewing incident reports, outage reports, and past assessment reports.
- It helps identify vulnerabilities, common problems, and areas needing improvements and correction.
Review of System Logs, Audit Trails, and Intrusion Detection System Outputs
- System logs, audit trails, and intrusion detection system (IDS) outputs provide information for vulnerability discovery.
- Auditing of events (actions) provides detailed information on who accessed, what was accessed, when, and where. This may include who attempted to log in to a resource or what files were accessed.
- An IDS detects intrusions and alerts administrators to security issues.
- Events from an intrusion detection system (IDS) can detail attack patterns launched against a network. Attacks from a DMZ, the Internet, and internal networks can be identified.
- IDS's usually consist of multiple agents, often one outside a firewall, one within a DMZ, and one within the internal network.
Other Assessment Tools
- Review historical data, perform threat modeling, and analyze tools (including Nmap, Nessus, SATAN, and SAINT) to identify and respond to threats and vulnerabilities.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers Chapter Four of Security Risk Management, which focuses on identifying and analyzing threats, vulnerabilities, and exploits. It discusses assessment techniques, best practices, and the importance of documentation and system logs in the assessment process. Test your knowledge on threat assessments across various IT infrastructure domains.