字幕列表 影片播放 由 AI 自動生成 列印所有字幕 列印翻譯字幕 列印英文字幕 - The goal of a risk assessment - 風險評估的目標 is to determine where an organization 是為了確定一個組織在哪裡 may be most exposed or where something bad might happen 可能最容易暴露的地方或可能發生壞事的地方 that could hurt the organization's ability 可能會損害該組織的能力 to deliver on its intended mission. 以實現其預期的任務。 The quality of all other security assessments 所有其他安全評估的品質 will improve if you're using the results 將提高,如果你在使用的結果 of a recent risk assessment as one of your key inputs. 最近的風險評估作為你的關鍵投入之一。 When you're conducting a risk assessment 當你在進行風險評估時 your goal will be to identify threats and vulnerabilities 你的目標將是識別威脅和漏洞 that could potentially harm the organization. 可能對組織造成潛在損害的問題。 Knowing the difference between a threat 瞭解威脅之間的區別 and a vulnerability is essential. 和漏洞是必不可少的。 Fortunately, we can turn to NIST, 幸運的是,我們可以求助於NIST。 the National Institute of Standards and Technology, 國家標準和技術研究所。 to help us better understand that difference. 以幫助我們更好地理解這種差異。 NIST considers a threat to be a circumstance or event NIST認為威脅是指一種情況或事件 that could damage the confidentiality, integrity, 可能破壞保密性、完整性。 or availability of information or information systems. 或資訊或信息系統的可用性。 That means if something or someone could expose 這意味著如果某件事情或某人可能暴露 an organization's secret information, 一個組織的祕密資訊。 stuff like intellectual property 像知識產權這樣的東西 or customer personal information 或客戶的個人信息 or if that thing could make changes 或者,如果那個東西能做出改變 without the proper approvals, 沒有經過適當的準許。 or if that person could take a web application offline, 或者,如果這個人可以把一個網絡應用程序脫機。 well, then that's a threat. 那麼,這就是一種威脅。 A vulnerability is a weakness that enables the threat 漏洞是一個弱點,能夠使威脅 to be successful. 以獲得成功。 A missing security patch is a great example 一個缺失的安全補丁就是一個很好的例子 of a vulnerability, 的漏洞。 so is a default admin password still in use 那麼默認的管理密碼是否還在使用 on some internet-facing web portal. 在一些面向互聯網的網絡門戶上。 When it comes to availability, 當涉及到可用性時。 the fact that a data center is located in an area 數據中心位於一個地區的事實 prone to flooding or tornadoes is an example 容易發生水災或龍捲風的地方就是一個例子 of a physical vulnerability. 的物理脆弱性。 During your risk assessment 在你的風險評估期間 you'll identify the threats and vulnerabilities 你將識別威脅和漏洞 about which the organization should be concerned 本組織應關注的問題 and then you'll score the potential likelihood 然後你會對潛在的可能性進行評分 and the potential impact of each risk. 以及每種風險的潛在影響。 Likelihood is the probability 可能性是指概率 that a threat might actually succeed 威脅可能真的成功 in exploiting a vulnerability. 在利用漏洞的過程中。 Let's look at malware, as an example. 讓我們看一下惡意軟件,作為一個例子。 What's the likelihood 可能性有多大 that your laptop will get infected with a virus? 你的筆記本電腦會被感染病毒嗎? Well, it depends on a number of things, doesn't it? 嗯,這取決於很多事情,不是嗎? Do you run an antivirus program? 你是否運行防病毒程序? Do you use your laptop to access the internet? 你是否使用你的筆記本電腦訪問互聯網? Do you open email attachments from people you don't know? 你會打開來自你不認識的人的電子郵件附件嗎? As you ask relevant questions about each threat and 當你對每個威脅提出相關的問題,並 about how exposed you might be to different attack vectors, 關於你可能暴露於不同的攻擊載體的程度。 it should become apparent whether or not 應該可以看出,是否 the risk you're considering is highly likely to do harm, 你所考慮的風險極有可能造成傷害。 highly unlikely, or somewhere in between. 非常不可能,或者介於兩者之間。 That's why NIST relies on a high, medium, 這就是為什麼NIST依靠高、中。 low scale when scoring risks. 在對風險進行評分時,採用低尺度。 You also need to consider the impact though, 不過你也需要考慮影響。 to get an accurate risk score. 以獲得一個準確的風險分數。 If your laptop gets infected with malware, 如果你的筆記本電腦被感染了惡意軟件。 well, that'll make for a bad day for you. 那麼,這將使你的日子變得很糟糕。 But what if the entire server network 但是,如果整個服務器網絡 at your company gets infected with malware? 在你的公司被感染了惡意軟件? The impact of an incident 事件的影響 like that would be much more expensive 這樣一來,成本就會高很多 since it impacts a lot more people. 因為它影響到更多的人。 NIST follows the same low, medium, NIST同樣遵循低、中、高的原則。 high scoring methodology for the impact 影響的高分方法 as it does for likelihood. 正如它對可能性所做的那樣。 All you have to do is combine the two scores, 你所要做的就是把兩個分數結合起來。 often through a simple math equation, and voila, 經常通過一個簡單的數學方程,然後就可以了。 you have a risk score. 你有一個風險分數。 If you've never conducted a risk assessment 如果你從未進行過風險評估 my advice to you is that you don't get caught up 我給你的建議是,你不要被捲入其中。 in the details just yet. 在細節上還沒有。 Again, the goal of a risk assessment is to prioritize risks 同樣,風險評估的目標是對風險進行優先排序 so that you can take the necessary action to 這樣你就可以採取必要的行動來 reduce those scores to an acceptable level based 將這些分數降低到可接受的水準,基於 on the leadership team's risk appetite. 領導人團隊的風險偏好。 When preparing for an upcoming risk assessment 在為即將進行的風險評估做準備時 make sure to do your research. 一定要做研究。 Verizon's Data Breach Investigations Report Verizon的數據洩露調查報告 has a lot of real world data on actual security incidents 擁有大量關於實際安全事件的真實世界數據 that resulted in data breaches. 導致數據洩露。 And so does the Privacy Rights Clearinghouse 而隱私權利交流中心也是如此。 chronology of data breaches. 數據洩露的年表。 You can also turn to industry-specific 你也可以求助於特定行業的 Information Sharing and Analysis Centers, or ISACs, 資訊共享和分析中心,即ISACs。 for threat and vulnerability information relevant 威脅和脆弱性的相關資訊 to your specific industry. 適應你的特定行業。 You can even turn to your internal 你甚至可以求助於你的內部 IT service management system IT服務管理系統 for historical help desk ticket information. 以瞭解歷史上的服務檯票據資訊。 As a matter of fact, 作為一個事實上的問題。 I highly recommend that you do just that 我強烈建議你這樣做 before embarking on your first risk assessment. 在開始進行第一次風險評估之前,請注意以下幾點。 At the end of the day you should have a report 在一天結束時,你應該有一份報告 that contains a prioritized list 其中包含了一個按優先順序排列的列表 of information security risks that your leadership team 你的上司團隊的信息安全風險的 will want you to keep a close eye on. 將希望你密切關注。 (upbeat music) (歡快的音樂)
B1 中級 中文 風險 評估 威脅 漏洞 分數 數據 IT安全教程 - 風險評估和風險評分 (IT Security Tutorial - Risk assessments and risk scores) 9 0 Summer 發佈於 2022 年 11 月 16 日 更多分享 分享 收藏 回報 影片單字