Vulnerability Scoring: CVSS and CVE

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which industry-standard method catalogs known vulnerabilities and provides a severity score?

  • CVSS (correct)
  • OWASP WSTG
  • NIST SP 800-115
  • CVE

Which vulnerability catalog creates a list of publicly known vulnerabilities, each with a unique ID, description, and references?

  • CVSS
  • NIST SP 800-115
  • CVE (correct)
  • OWASP WSTG

Match the CVSS metric group with the correct information: Environmental metric group.

  • Includes modified base metrics, confidentiality, integrity, and availability requirements. (correct)
  • Includes exploit code maturity, remediation level, and report confidence.
  • Includes exploitability metrics and impact metrics.

Which three items are included in the base metric group used by CVSS?

<p>User Interaction (A), Integrity Impact (B), Attack Complexity (D)</p> Signup and view all the answers

Which item is included in the environmental metric group used by CVSS?

<p>Confidentiality Requirements (D)</p> Signup and view all the answers

Which item is included in the temporal metric group used by CVSS?

<p>Exploit Code Maturity (D)</p> Signup and view all the answers

Which tool can ingest the results from multiple penetration testing tools and help a cybersecurity analyst produce reports in formats such as CSV, HTML, and PDF?

<p>Dradis (A)</p> Signup and view all the answers

Which control category does 'Key Rotation' fall under?

<p>Technical (B)</p> Signup and view all the answers

Which control category does 'Input Sanitization' fall under?

<p>Technical (A)</p> Signup and view all the answers

Which control category does 'Secure Software Development Life Cycle' fall under?

<p>Administrative (C)</p> Signup and view all the answers

Which control category does 'Role-Based Access Control' fall under?

<p>Administrative (D)</p> Signup and view all the answers

Which two items are examples of technical controls that can be recommended as mitigations for vulnerabilities discovered during a pen test?

<p>Multi-Factor Authentication (B), Certificate Management (C)</p> Signup and view all the answers

A cybersecurity analyst's report includes process-level remediation, patch management, and secrets management solutions from a recent pen-test. Which control category does this represent?

<p>Technical (C)</p> Signup and view all the answers

A cybersecurity analyst report includes minimum password requirements, security policies and procedures. These are examples of which control category?

<p>Administrative (C)</p> Signup and view all the answers

Which control category includes information on mandatory vacations and user training in the cybersecurity analyst report?

<p>Administrative (A)</p> Signup and view all the answers

Flashcards

CVSS (Common Vulnerability Scoring System)

An industry-standard method maintaining a catalog of known vulnerabilities, scoring their severity.

CVE (Common Vulnerabilities and Exposures)

A vulnerability catalog with publicly known vulnerabilities, their IDs, descriptions, and references.

CVSS Base Metric Group

Includes exploitability metrics and impact metrics

CVSS Temporal Metric Group

Includes exploit code maturity, remediation level, and report confidence.

Signup and view all the flashcards

CVSS Environmental Metric Group

Includes modified base metrics, confidentiality, integrity, and availability requirements.

Signup and view all the flashcards

Items in CVSS Base Metric Group

attack complexity, integrity impact, user interaction

Signup and view all the flashcards

Item in CVSS Temporal Metric Group

exploit code maturity

Signup and view all the flashcards

Item in CVSS Environmental Metric Group

confidentiality requirements

Signup and view all the flashcards

Dradis

A tool that ingests penetration testing results and creates reports in various formats.

Signup and view all the flashcards

Technical Controls for Vulnerability Mitigation

Multifactor authentication and certificate management

Signup and view all the flashcards

Technical Control Category

Process-level remediation, patch management, secrets management solutions

Signup and view all the flashcards

OWASP

Provides guidance on preventing web vulnerabilities like XSS, SQL injection, and command injection.

Signup and view all the flashcards

Administrative Controls

Controls that include policies and procedures.

Signup and view all the flashcards

Administrative Control Examples

User training and mandatory vacations are examples of administrative controls.

Signup and view all the flashcards

True Positive

A successful identification of a security attack.

Signup and view all the flashcards

Study Notes

Industry-Standard Vulnerability Scoring

  • CVSS (Common Vulnerability Scoring System) catalogues known vulnerabilities.
  • CVSS provides a score indicating the severity of a vulnerability.

Publicly Known Vulnerabilities

  • CVE (Common Vulnerabilities and Exposures) catalogue creates a list of publicly known vulnerabilities.
  • Each CVE entry is assigned an ID number, description, and reference.

CVSS Metric Groups

  • Base metric group: Includes exploitability metrics and impact metrics.
  • Environmental metric group: Includes modified base metrics, confidentiality, integrity, and availability requirements.
  • Temporal metric group: Includes exploit code maturity, remediation level, and report confidence.

CVSS Base Metric Group Items

  • Attack complexity
  • Integrity impact
  • Availability requirements

CVSS Environmental Metric Group Items

  • Confidentiality requirements

CVSS Temporal Metric Group Items

  • Exploit code maturity

Penetration Testing Report Generation

  • Dradis can ingest results from penetration testing tools
  • Cybersecurity analysts use Dradis to produce reports in formats like CSV, HTML, and PDF.

Technical Controls

  • Multifactor authentication
  • Certificate management

Pen-Test Results

  • Process-level remediation
  • Patch management
  • Secrets management solutions

Vulnerability Prevention

  • OWASP (Open Web Application Security Project) provides cheat sheets and detailed guidance on preventing vulnerabilities.
  • Examples of vulnerabilities include: cross-site scripting, SQL injection, and command injection

Minimum Password Requirements

  • Minimum password requirements and policies/procedures are examples of administrative controls.

User Training

  • Mandatory vacations and user training are included in the administrative control category.

Access Control

  • Access control vestibule information are included in the physical security control category.

True Positive

  • A successful identification of a security attack or a malicious event

False Positive (Benign Trigger)

  • A security device that triggers an alarm where no actual malicious activity is taking place.

Alert fatigue.

  • False positives diminish the value and urgency of real alerts

False Negatives

  • Malicious activites that are undetected by network security devices

True Negatives

  • An intrusion detection device identifies an activity as acceptable behavior, and the activity in fact, is acceptable

Incident Identification

  • A true positive event is a successful identification of a security attack.

Technical Controls for Vulnerability Mitigation

  • User input sanitization

Administrative Controls

  • RBAC (Role-Based Access Control) enables administrators to control what users can do.
  • Control is at both broad and granular levels

Security Education and Training

  • "Building an Information Technology Security Awareness and Training Program" highlights the importance of security education for users.
  • It defines ways to improve the security operations of an organization.

CVSS Scoring Interpretation

  • CVSS scores are rated from 0 to 10, with 10 being the most severe.

System Hardening

  • System hardening belongs to the technical control category.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

CVSS Assessment Quiz
5 questions

CVSS Assessment Quiz

ReliablePrehnite avatar
ReliablePrehnite
CVSS Vulnerability Scoring Overview
40 questions
CVSS v2 Vulnerability Metrics
31 questions
Use Quizgecko on...
Browser
Browser