What is Change Management?
Formal process to make a change
Important for managing risks in an organization.
Why is Change Management important?
It addresses one of the most common risks in organizations.
What are the steps in an approval change process?
These steps ensure a structured approach to implementing changes.
Who is responsible for ownership in Change Management?
Individual or entity that needs to make a change
They oversee/manage the change but do not perform it.
What is Impact Analysis in Change Management?
Identify risks involved with making a change
It assesses the potential impact on different parts of the organization.
What is a Backout plan?
Plan to revert everything back to before the change
Implemented if something goes wrong during the change.
What are Maintenance Windows?
Scheduled times for changes to minimize business interference
Usually done overnight to avoid disruption.
What is an Allow/Deny List in Technical Change Management?
This helps manage application security.
What are Restricted Activities in Change Management?
Must follow specific change scope and window time
Only approved changes can be made.
What is the purpose of Documentation in Change Management?
Must be a living document, ongoing updates
Includes updating diagrams, policies, and procedures.
What are the motivations of Threat Actors?
These motivations drive various cyber attacks.
What are the types of Threat Actors?
Each type has different capabilities and motivations.
What are Human vectors/social engineering attacks?
These attacks exploit human behavior to gain unauthorized access.
What is SQL injection (SQLi)?
Type of code injection attack adding info into data stream
Often done through web browsers into forms or fields.
What is XSS?
Cross-Site Scripting, uses JavaScript to exploit trust in browsers
Types include non-persistent, persistent, and DOM-based XSS.
What are Application Vulnerabilities?
These vulnerabilities allow malware to exploit applications.
What are OS based vulnerabilities fixed by?
Regular patching
Keeping operating systems updated is crucial for security.
What are Cloud-specific vulnerabilities?
These vulnerabilities target cloud services and applications.
What is a Zero-day vulnerability?
Unknown vulnerabilities with no available patch
These pose significant risks as they are exploited before being discovered.
What is Ransomware?
Malware that demands money
Often delivered through phishing or email compromise.
What is a Trojan?
Malware disguised as legitimate software
Relies on human interaction for delivery.
What is a Botnet?
A collection of systems controlled by a command and control server
Used for various malicious activities.
What is Privilege escalation?
Gaining higher-level access to a system
Can be achieved by exploiting known vulnerabilities.
What is CSRF (Cross-Site Request Forgery)?
Exploits the trust a web application has for the user
Prevented using cryptographic tokens.