Chapter 11 Flashcards

(31 cards)

1
Q

What is a Vulnerability Assessment?

A
  • Identify and assign severity levels to as many security defects as possible
  • Can be automated or manual
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the Objectives of a Vulnerability Assessment?

A
  • Discover vulnerabilities before they are exploited
  • Identify Vulnerabilities
  • Document vulnerabilities so they can be recreated
  • Create guidance to assist developers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the Types of Vulnerability Assessments?

A
  • Host Assessment
  • Network and Wireless Assessment
  • Database Assessment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Host assessment?

A

Assessment of critical servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Network and Wireless Assessment?

A

Assessment of network and network-accessible resource policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Database Assessment?

A

Assessment of databases or big data systems and classifying sensitive data across infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the Five Key Steps in Vulnerability Management?

A
  • Outline vulnerability management policy
  • Discover existing vulnerabilities
  • Analyze current level of security and rank vulnerabilities
  • Mitigate causes of vulnerabilities
  • Maintain security through ongoing testing and discovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Vulnerability Management Policy?

A
  • Define levels of security
  • Set guidelines for vulnerability management practices
  • Classify vulnerabilities
  • Define how often scans occur
  • Define access-control policies
  • Outline noncompliance consequence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the Phases of a Vulnerability Assessment Scanner?

A
  • Vulnerability Identification
  • Analysis
  • Risk Assessment
  • Remediation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Processes in the Security Scanning Process

A
  • Scoping (pre task)
  • Gathering Information (pre task)
  • Vulnerability identification
  • Vulnerability analysis
  • Risk Assessment
  • Remediation
  • Validation (post Task)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Scoping in Security Scanning?

A

Define the scope of the assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Gathering Information in Security Scanning?

A
  • Collecting information about the target systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Vulnerability Identification in Security Scanning?

A

Analyzing the results of the vulnerability scans and identifying potential vulnerabilities that could be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Risk Assessment in Security Scanning?

A

Prioritizing vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Vulnerability Analysis in Security Scanning?

A

Identify source and root cause of vulnerabilities identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the Factors considered in Risk Assessment in Security Scanning?

A
  • Affected systems
  • Data at risk
  • Business functions at risk
  • Ease of attack or compromise
  • Severity of attack
  • Potential damage
16
Q

What is Remediation in Security Scanning?

A
  • Closing security gaps
  • Typically a joint effort by security, development, and operations
17
Q

What is Validation in Security Scanning?

A

Performing a follow-up assessment to validate that vulnerabilites have been properly addressed

18
Q

What is a Vulnerability Scoring System?

A

Used to quantify and prioritize vulnerabilities based on severity and potential impact

19
Q

What is the CVSS?

A

The Common Vulnerability Scoring System is a standard that assigns a numerical score ranging from 0 to 10 based on several factors

20
Q

What is the CVE?

A

The Common Vulnerabilities and Exposures system logs publicly known vulnerabilities and assigns a unique identifier to them

21
Q

What is the Identifier format for the CVE?

A

CVE-Year-#####

22
Q

What is the Format of a CVSS Vector String?

A
  • Identifier
  • Impact
  • Environmental Concerns
  • Additional information
23
Q

What are the Three CVSS Metric Groups?

A
  • Base: no changes
  • Environmental: might vacy in different deployments
  • Temporal: changes over time
24
What are the CVSS Exploitability Metrics?
- Attack Vector (AV) - Attack Complexity (AC) - Privilages Required (PR) - User Interaction (UI)
25
What are the CVSS Impact Metrics?
- Confidentiality Impact (C) - Integrity Impact (I) - Availability Impact (A)
26
What are the CVSS Security Requirements Metrics?
- Confidentiality Requirement (CR) - Integrity Requirement (IR) - Availability Requirement (AR)
27
What are the CVSS Temporal Metrics?
- Exploitability (E): how known is the exploit - Remediation Level (RL): how known is the remedy - Report Confidence (RC): How logged is the exploit
28
What are the benefits of CVSS?
- Objective Measure of risk - Insight into vulnerabilities - Helps teams focus efforts - Insight into a vulnerability's potential impact
29
What are the CVSS Risk Scores?
- None (0+) - Low (0.1+) - Medium (4+) - High (7+) - Critical (9+)
30
Give some CVSS Alternatives
- Common Weakness Scoring System (CWSS) - Base Finding Metric Group