Security Risk Management Chapter 4
116 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of a threat assessment?

  • To assess historical risks
  • To identify and evaluate potential threats (correct)
  • To review system documentation
  • To perform vulnerability scans
  • Threat assessments are performed indefinitely over time.

    False

    What are the three impacts that threats can have on information systems?

    Confidentiality, Integrity, Availability

    A threat assessment evaluates the _____ of a threat's frequency.

    <p>estimate</p> Signup and view all the answers

    Which technique helps ensure that data is not modified or destroyed?

    <p>Hashing</p> Signup and view all the answers

    Match the following terms with their definitions:

    <p>Threat = An activity that represents a possible danger Vulnerability = A weakness that can be exploited Exploit = The act of taking advantage of a vulnerability Risk = The potential for loss or damage when a threat exploits a vulnerability</p> Signup and view all the answers

    The success of a vulnerability assessment often relies on reviewing system logs and _____ trails.

    <p>audit</p> Signup and view all the answers

    What is the primary function of an Intrusion Detection System (IDS)?

    <p>To send alerts when intrusions are detected</p> Signup and view all the answers

    A host-based IDS is installed on multiple systems throughout a network.

    <p>False</p> Signup and view all the answers

    What information is recorded when auditing is enabled on a folder?

    <p>User name, accessed file, time of access, server or computer used.</p> Signup and view all the answers

    An automated system has the capability of examining logs from multiple __________.

    <p>sources</p> Signup and view all the answers

    Match the following agents with their functions in a network-based IDS:

    <p>Agent 1 = Identifies attacks from the Internet Agent 2 = Reports attacks that get through the external firewall Agent 3 = Monitors attacks through the second firewall of the DMZ</p> Signup and view all the answers

    What is a primary purpose of implementing fault tolerance strategies?

    <p>To ensure systems continue to operate during an outage</p> Signup and view all the answers

    Natural threats are primarily caused by human actions.

    <p>False</p> Signup and view all the answers

    Name one common threat from internal sources.

    <p>Unintentional access</p> Signup and view all the answers

    A disgruntled employee could cause __________ to data if their access is not properly controlled.

    <p>corruption</p> Signup and view all the answers

    Match the following threats to their categories:

    <p>Phishing = Human threat - Unintentional Flood = Natural threat Unauthorized access = Human threat - Intentional Earthquake = Natural threat</p> Signup and view all the answers

    Which of the following events is categorized as a natural threat?

    <p>Tornado</p> Signup and view all the answers

    Accidental access to data by employees poses no risk to organizations.

    <p>False</p> Signup and view all the answers

    What should be done with a terminated employee’s user account?

    <p>It should be deleted or disabled.</p> Signup and view all the answers

    External attackers can include __________ trying to launch denial of service attacks.

    <p>hackers</p> Signup and view all the answers

    How frequently are automated vulnerability scans typically performed?

    <p>Weekly</p> Signup and view all the answers

    Internal vulnerability assessments are conducted by personnel outside the company.

    <p>False</p> Signup and view all the answers

    What type of assessment is typically conducted on an annual basis to evaluate security controls?

    <p>Audit</p> Signup and view all the answers

    A successful __________ attack may indicate that the system is not being updated often enough.

    <p>buffer overflow</p> Signup and view all the answers

    Match the type of assessment with its description:

    <p>Internal assessments = Conducted by in-house security personnel External assessments = Performed by outside consultants Audit = Annual evaluation of security controls Vulnerability scans = Automated checks for security weaknesses</p> Signup and view all the answers

    Which of the following is NOT a source for documentation review during a vulnerability assessment?

    <p>User satisfaction surveys</p> Signup and view all the answers

    External personnel are usually less effective at quickly identifying security weaknesses than in-house staff.

    <p>False</p> Signup and view all the answers

    What practice is used to improve the effectiveness of vulnerability assessments?

    <p>Reviewing past assessment reports</p> Signup and view all the answers

    The process of evaluating security controls includes documenting incidents and __________ reports.

    <p>outage</p> Signup and view all the answers

    What is one of the steps taken during a vulnerability assessment?

    <p>Documentation review</p> Signup and view all the answers

    Which of the following is NOT one of the seven domains of a typical IT infrastructure?

    <p>Physical Domain</p> Signup and view all the answers

    Threat modeling requires understanding both hardware and software failures in a system.

    <p>True</p> Signup and view all the answers

    What is the first step in performing threat modeling?

    <p>Identify the assets you want to evaluate.</p> Signup and view all the answers

    The seven domains of a typical IT infrastructure include the User Domain, __________ Domain, LAN Domain, and System/Application Domain.

    <p>Workstation</p> Signup and view all the answers

    Match the following domains with their descriptions:

    <p>User Domain = Where end-users interact with systems LAN Domain = Local area network environments WAN Domain = Wide area network connectivity Remote Access Domain = Access from external locations</p> Signup and view all the answers

    What is one best practice when evaluating threats across the seven domains?

    <p>Verify that systems operate as expected</p> Signup and view all the answers

    Internal users cannot misuse a system.

    <p>False</p> Signup and view all the answers

    Name one question to ask when performing threat modeling.

    <p>Is the system susceptible to attacks?</p> Signup and view all the answers

    Understanding data ______ is essential to perform effective threat assessments.

    <p>flow</p> Signup and view all the answers

    Which of the following best describes asset management?

    <p>Identifying and evaluating important assets within an organization</p> Signup and view all the answers

    Signup and view all the answers

    What is the main issue caused by scope creep in software development?

    <p>Increased functionality without planning</p> Signup and view all the answers

    Access controls testing verifies that users have more permissions than they need for their jobs.

    <p>False</p> Signup and view all the answers

    What is a 'right' in the context of access controls?

    <p>A right grants the authority to perform an action on a system.</p> Signup and view all the answers

    Scope creep refers to the addition of functionalities that are outside the scope of the original __________ specifications.

    <p>product</p> Signup and view all the answers

    What is spear-phishing?

    <p>Targeted phishing attempts from within a company</p> Signup and view all the answers

    Threat modeling is a straightforward process that requires minimal effort.

    <p>False</p> Signup and view all the answers

    What are two techniques for identifying threats?

    <p>Review historical data and perform threat modeling.</p> Signup and view all the answers

    A lack of physical control over laptops often leads to ______ of hardware and compromised data.

    <p>theft</p> Signup and view all the answers

    Match each type of threat with its description:

    <p>Forwarding viruses = Infected emails being shared unknowingly Spear-phishing = Targeted email deception from known individuals Lack of laptop control = Risk of theft and data compromise Historical data review = Analyzing past incidents to identify threats</p> Signup and view all the answers

    What is the final step in a threat assessment?

    <p>Providing a report of findings</p> Signup and view all the answers

    What does a threat assessment report typically include?

    <p>Findings, threats, likelihood, and identified costs.</p> Signup and view all the answers

    Threat modeling requires understanding the flow of data in and out of systems.

    <p>True</p> Signup and view all the answers

    The seven domains of typical IT infrastructure include User Domain, Workstation Domain, LAN Domain, and __________ Domain.

    <p>WAN</p> Signup and view all the answers

    Which of the following is a key question to ask when performing threat modeling?

    <p>What system are you trying to protect?</p> Signup and view all the answers

    Internal users are exempt from misusing the system.

    <p>False</p> Signup and view all the answers

    What is the primary purpose of asset management in threat modeling?

    <p>To identify and evaluate important assets.</p> Signup and view all the answers

    Understanding how __________ flows in and out of systems is crucial for threat assessment.

    <p>data</p> Signup and view all the answers

    What is the purpose of an audit in an organization?

    <p>To determine if policies are being followed</p> Signup and view all the answers

    A policy should not disable user accounts when an employee leaves an organization.

    <p>False</p> Signup and view all the answers

    What should be done with user accounts that have not been used for six months?

    <p>Accounts should be deleted.</p> Signup and view all the answers

    The ______ analysis examines the output to determine if a vulnerability exists.

    <p>output</p> Signup and view all the answers

    Match the following analysis types with their descriptions:

    <p>Process Analysis = Evaluates processes used to determine output Output Analysis = Examines the resulting output for vulnerabilities</p> Signup and view all the answers

    What tool can assist an auditor in determining enabled accounts not used recently?

    <p>Script</p> Signup and view all the answers

    Personnel interviews can help assess the security knowledge of employees.

    <p>True</p> Signup and view all the answers

    When is it acceptable to give out passwords according to a secure organization policy?

    <p>Never.</p> Signup and view all the answers

    An audit may include checking for user accounts that haven't been used in the past ______ days.

    <p>15</p> Signup and view all the answers

    What is one method for determining the effectiveness of a firewall?

    <p>Using process or output analysis</p> Signup and view all the answers

    What is the primary purpose of system logs in computer systems?

    <p>To log data based on system activities</p> Signup and view all the answers

    Audit trails only log successful user activities.

    <p>False</p> Signup and view all the answers

    Name one type of event that system logs can record.

    <p>Warnings</p> Signup and view all the answers

    An audit trail attempts to log at least who, what, when, and _____ of events.

    <p>where</p> Signup and view all the answers

    Which event would likely stand out immediately when reviewing system logs?

    <p>An error event</p> Signup and view all the answers

    Automated systems can only review a single source of audit trails at a time.

    <p>False</p> Signup and view all the answers

    What is a key element that an audit log typically captures when auditing is enabled?

    <p>User name</p> Signup and view all the answers

    The _____ is used in Microsoft Windows to view system events.

    <p>Windows Event Viewer</p> Signup and view all the answers

    Match the type of log with its function:

    <p>System log = Captures system start and stop events Security log = Records access attempts Network log = Tracks data transfer activities Application log = Monitors application-specific events</p> Signup and view all the answers

    Which of the following threats are categorized as human threats?

    <p>Hacking attempts</p> Signup and view all the answers

    Name one reason why disgruntled employees can pose a threat to data security.

    <p>They may access, modify, or corrupt the organization’s data.</p> Signup and view all the answers

    Employees can accidentally delete data if they have __________ access to information they do not need.

    <p>unintentional</p> Signup and view all the answers

    Match the following types of threats with their descriptions:

    <p>Internal threats = Include actions from employees that may be accidental or malicious Natural threats = Result from weather events such as floods and earthquakes External threats = Origin from outside the organization, like hackers or malware Accidental threats = Caused by unintentional actions of users</p> Signup and view all the answers

    Which of the following is a proactive measure to mitigate internal threats?

    <p>Employee training and access control implementation</p> Signup and view all the answers

    What should happen to an employee's user account after termination?

    <p>It should be deleted or disabled.</p> Signup and view all the answers

    What type of Intrusion Detection System (IDS) is installed on a single system?

    <p>Host-based IDS</p> Signup and view all the answers

    An intrusion detection system can only monitor and cannot alert users.

    <p>False</p> Signup and view all the answers

    What information is included in an audit trail when file access is recorded?

    <p>user name, accessed file, time of access, and server or computer</p> Signup and view all the answers

    A network-based IDS has several monitoring agents installed throughout the __________.

    <p>network</p> Signup and view all the answers

    Match the agents in a network-based IDS with their respective functions:

    <p>Agent 1 = Identifies attacks launched from the Internet Agent 2 = Detects successful attacks that penetrate the external firewall Agent 3 = Shows attacks that manage to pass through the DMZ's second firewall</p> Signup and view all the answers

    What is the primary focus of a vulnerability assessment?

    <p>Identifying existing vulnerabilities</p> Signup and view all the answers

    Internal human threats pose no risk to data integrity.

    <p>False</p> Signup and view all the answers

    What principle ensures that users have only the access they need to perform their job?

    <p>Principle of least privilege</p> Signup and view all the answers

    Failure to implement access controls can make an entire network vulnerable, leading to unauthorized ______ of data.

    <p>disclosure</p> Signup and view all the answers

    Match the type of threat with its example:

    <p>Natural Threat = Earthquake causing data center damage Internal Human Threat = Disgruntled employee leaking information External Human Threat = Hacker attempting to breach network Natural Disaster = Flood impacting physical infrastructure</p> Signup and view all the answers

    Which of the following describes social engineering in the context of security vulnerabilities?

    <p>Manipulating individuals to reveal confidential information</p> Signup and view all the answers

    A buffer overflow attack can be reported as an internal human threat.

    <p>False</p> Signup and view all the answers

    What is one method to minimize human-related vulnerabilities?

    <p>User training and awareness</p> Signup and view all the answers

    A ______ is a process conducted to evaluate the effectiveness of an organization's security controls.

    <p>vulnerability assessment</p> Signup and view all the answers

    All users having the same rights and permissions for a network enhances security.

    <p>False</p> Signup and view all the answers

    Understanding how data flows in and out of systems is essential for effective threat assessments.

    <p>True</p> Signup and view all the answers

    List one of the seven domains of a typical IT infrastructure.

    <p>User Domain</p> Signup and view all the answers

    When performing threat assessments, it’s important to understand the system or application you’re ______.

    <p>evaluating</p> Signup and view all the answers

    Match the following best practices to their descriptions:

    <p>Verify system operations = Ensure the system is functioning as intended Limit the scope of assessment = Focus on one domain at a time Interview experts = Gain insights from knowledgeable individuals Review documentation = Understand system configuration and data flow</p> Signup and view all the answers

    Who could be potential adversaries when performing threat modeling?

    <p>Both internal and external parties</p> Signup and view all the answers

    A successful threat assessment does not require an understanding of hardware or software failures.

    <p>False</p> Signup and view all the answers

    An excellent starting point for threat modeling is to use the _____ of a typical IT infrastructure.

    <p>seven domains</p> Signup and view all the answers

    What is one key question to ask when performing threat modeling?

    <p>Is the system susceptible to attacks?</p> Signup and view all the answers

    An audit trail can only be recorded in security logs.

    <p>False</p> Signup and view all the answers

    What information does an automated system have the capability of examining in audit trails?

    <p>Logs from multiple sources</p> Signup and view all the answers

    Windows systems use the Event Viewer to view the _____ log.

    <p>System</p> Signup and view all the answers

    Match the following types of logs with their functions:

    <p>System Log = Records system events such as errors and warnings Security Log = Tracks auditable events like user access Firewall Log = Monitors network traffic and access attempts Application Log = Logs application-specific events and errors</p> Signup and view all the answers

    What type of information is typically recorded in an audit log?

    <p>Who accessed what, when, and where</p> Signup and view all the answers

    System logs are primarily concerned with monitoring user behavior.

    <p>False</p> Signup and view all the answers

    What is one advantage of using automated systems for reviewing audit trails?

    <p>Efficiency in analyzing multiple logs</p> Signup and view all the answers

    An audit trail attempts to log at least _____ elements: who, what, when, and where.

    <p>four</p> Signup and view all the answers

    Which of the following statements about audit trails is true?

    <p>They can help identify unauthorized access to data.</p> Signup and view all the answers

    Study Notes

    Security Risk Management and Ethics

    • Chapter Four focuses on identifying and analyzing threats, vulnerabilities, and exploits.
    • The chapter covers threat assessments, vulnerability assessments, and exploit assessments.
    • The goals of the chapter include describing threat identification techniques, listing best practices for threat assessments across seven IT infrastructure domains, explaining the value of reviewing documentation and system logs for vulnerability assessment.
    • Identifying tools for vulnerability scans, best practices for vulnerability assessments, and identifying exploits throughout the seven domains of a typical IT infrastructure are also goals.

    Threat Assessments

    • A threat assessment identifies and evaluates potential threats.
    • The goal is to identify as many potential threats as possible and then evaluate each threat to determine likelihood of occurrence.
    • The frequency of a threat is important.
    • A threat assessment is conducted at a specific point in time, as risks can change.
    • The assessment considers existing threats in the current environment.

    Threat Assessments (Continued)

    • Threats represent potential dangers (human actions, environmental factors, and external threats).
    • Impacts on confidentiality (unauthorized disclosure), integrity (modification or destruction of data), and availability (service or system unavailability) are considered.
    • Human threats can be internal (e.g., disgruntled employees) or external (e.g., hackers, malware writers, terrorists).
    • Natural threats include various weather events (floods, earthquakes, tornados, storms), and fires.
    • Employee actions (malicious or accidental) can compromise data.
    • Unintentional access, data deletion, and forwarding of viruses are internal threats.
    • Lack of laptop security control (theft and data compromise) is an internal threat.
    • External actors can launch denial-of-service (DoS) attacks, create malware, and attempt to access, modify, or corrupt organizational data. Terrorists can also launch attacks.

    The Top Threats are Internal

    • Internal threats can be unintentional (e.g., accidental access or data deletion) or malicious (e.g., disgruntled employee actions).
    • Access controls, authentication processes, and least-privilege and need-to-know policies are crucial components to minimize the threat of unintentional or malicious user activity.
    • Ex-employee access accounts should be disabled or deleted post-termination to prevent unauthorized access.
    • Phishing attempts, often sophisticated, can target specific companies and trick users, appearing as if they originate from within the company.
    • Virus forwarding (inadvertent sharing of malicious emails), and lack of laptop security (theft and data compromise) are internal threats.

    Threat Assessments (Continued)

    • Historical data analysis and threat modeling are fundamental to identifying potential threats.
    • Historical data analysis includes reviewing previous incidents in an organization, similar organizations, and the local area (including weather events) to determine threats from various sources.
    • Different types of historical/organizational data can be examined, including security records, insurance claims, troubleshooting records, and employee interviews.

    Threat Modeling

    • Threat modeling is a method for evaluating and documenting security risks within applications or systems.
    • This process should ideally occur before application development or system deployment to avoid scope creep.

    Threat Modeling (Continued)

    • It's essential during the initial stages of a system's life-cycle to identify valuable assets, which helps to develop appropriate security measures.
    • The seven domains of IT infrastructure (User, Workstation, LAN, LAN-to-WAN, WAN, Remote Access, and System/Application) are important in threat modeling analysis.

    Vulnerability Assessments

    • A vulnerability assessment (VA) is performed to identify weaknesses within an IT infrastructure, or the personnel involved, or the network itself.
    • These weaknesses may lead to security violations.
    • Vulnerabilities can exist at the personnel, network, or specific server level.

    Vulnerability Assessments (Continued)

    • Vulnerabilities exist if access controls are not properly implemented or security awareness is lacking in personnel or processes.
    • Social engineering tactics (misinformation or manipulation to gain access to sensitive data) also create vulnerabilities.
    • Regular assessments are recommended to detect emerging or recurring vulnerabilities.

    Vulnerability Assessment (Continued)

    • Automated scans (e.g., Nmap, Nessus, SATAN, SAINT) are important to quickly identify vulnerabilities.
    • Audits and personnel interviews help to check for policy compliance and security knowledge.
    • Policies related to employee departures (disabling/deleting user accounts after they leave) are also checked as part of the audit processes.
    • Process and output analysis are used to identify inherent vulnerabilities.
    • System testing is important to discover vulnerabilities related to patches and updates of operational systems or programs.
    • Functionality testing will evaluate the adherence to the initial specifications.
    • Access controls testing verifies that user permissions and privileges are in accordance with the organization's policies. This will also include access restrictions (by grouping employees) based on their department.

    Vulnerability Assessment (Continued)

    • Penetration testing is another method to test and uncover vulnerabilities.
    • The goal is to evaluate the effectiveness of security controls against specific known vulnerabilities. A penetration test can detect the effectiveness of controls implemented against certain vulnerabilities, which include checking for vulnerabilities from inside or outside a network, and using a DMZ.
    • Appropriate and detailed documentation of results must occur for compliance and improvement.

    Best Practices: Vulnerability Assessments

    • Maintaining up-to-date vulnerability scanners enhances the success of assessments.
    • Performing internal and external checks helps in detecting vulnerabilities from various locations (within a network or outside), and from a DMZ.
    • Documenting vulnerability assessment results is crucial for tracking progress, compliance, reporting, and security improvements.

    Documentation Review

    • Documentation review includes reviewing incident reports, outage reports, and past assessment reports.
    • It helps identify vulnerabilities, common problems, and areas needing improvements and correction.

    Review of System Logs, Audit Trails, and Intrusion Detection System Outputs

    • System logs, audit trails, and intrusion detection system (IDS) outputs provide information for vulnerability discovery.
    • Auditing of events (actions) provides detailed information on who accessed, what was accessed, when, and where. This may include who attempted to log in to a resource or what files were accessed.
    • An IDS detects intrusions and alerts administrators to security issues.
    • Events from an intrusion detection system (IDS) can detail attack patterns launched against a network. Attacks from a DMZ, the Internet, and internal networks can be identified.
    • IDS's usually consist of multiple agents, often one outside a firewall, one within a DMZ, and one within the internal network.

    Other Assessment Tools

    • Review historical data, perform threat modeling, and analyze tools (including Nmap, Nessus, SATAN, and SAINT) to identify and respond to threats and vulnerabilities.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers Chapter Four of Security Risk Management, which focuses on identifying and analyzing threats, vulnerabilities, and exploits. It discusses assessment techniques, best practices, and the importance of documentation and system logs in the assessment process. Test your knowledge on threat assessments across various IT infrastructure domains.

    Use Quizgecko on...
    Browser
    Browser