Skip to content

Week 05 Quiz

Test your understanding of the weekly concepts.

Format: 10 multiple-choice questions. Passing score: 70%. Time: Untimed.

Take Quiz
CSY101 Week 05 Beginner

Apply threat, vulnerability, and risk thinking with beginner-friendly labs. Complete these before moving to reading resources.

Cybersecurity Essentials

Track your progress through this week's content

Week Introduction

๐Ÿ’ก Mental Model

Cybersecurity is risk management under uncertainty. You cannot eliminate all threats or patch all vulnerabilities. The professional skill is prioritizing what matters most โ€” balancing likelihood, impact, and available resources.

This week integrates concepts from Weeks 1-4 into a unified risk framework. You will learn to distinguish threats from vulnerabilities, calculate risk, and make defensible prioritization decisions.

Learning Outcomes (Week 5 Focus)

By the end of this week, you should be able to:

  • LO1 - Foundational Concepts: Define and distinguish threats, vulnerabilities, and risks using precise terminology
  • LO4 - Risk Reasoning: Apply risk thinking to prioritize security decisions based on likelihood, impact, and exposure
  • LO8 - Integration: Connect technical vulnerabilities to business risk (synthesis across weeks)

Lesson 5.1 ยท Threats: Sources of Potential Harm

Definition: A threat is any circumstance or event with the potential to cause harm to a system, organization, or individual. Threats represent what could happen, not what has happened.

Threat categories (by source):

  • Adversarial threats: Intentional actors with malicious intent
    Examples: Nation-state hackers, cybercriminals, hacktivists, malicious insiders
    Characteristics: Strategic, adaptive, motivated by specific goals (money, espionage, disruption)
  • Accidental threats: Human error without malicious intent
    Examples: Employee misconfigures cloud storage, admin deletes production database
    Characteristics: Common, often preventable with training and controls
  • Environmental threats: Natural events or infrastructure failures
    Examples: Power outages, floods, fires, hardware failures
    Characteristics: Unpredictable timing, require business continuity planning
  • Structural threats: Inherent system design flaws
    Examples: Software bugs, protocol weaknesses, architectural assumptions
    Characteristics: Exist regardless of attacker presence, discovered over time
๐Ÿ’ก Critical insight

Threats exist independently of vulnerabilities. A nation-state hacking group (threat) exists whether your systems are vulnerable or not. Risk emerges when threat meets vulnerability.

Threat modeling questions:

  • Who or what could cause harm? (Threat actor identification)
  • What are they capable of? (Technical skill, resources, access)
  • What motivates them? (Financial gain, espionage, ideology, accident)
  • How likely are they to target this system? (Attractiveness, exposure)

Lesson 5.2 ยท Vulnerabilities: Exploitable Weaknesses

Definition: A vulnerability is a weakness in a system that could be exploited to cause harm. Vulnerabilities represent how harm could occur.

Vulnerability categories (by type):

  • Technical vulnerabilities: Flaws in software, hardware, or protocols
    Examples: Buffer overflows, SQL injection, unpatched systems, weak encryption
    Common Weakness Enumeration (CWE): Standardized list of software vulnerability types
  • Configuration vulnerabilities: Insecure system settings
    Examples: Default passwords, open ports, excessive permissions, missing encryption
    Note: Often easier to exploit than code-level bugs (no 0-day needed)
  • Operational vulnerabilities: Process and procedure weaknesses
    Examples: No patch management, weak access reviews, missing monitoring, poor incident response
    Impact: Enable attacks to persist undetected
  • Human vulnerabilities: Social engineering susceptibility
    Examples: Phishing success, credential reuse, insider threats (intentional or accidental)
    Reality: Humans are often the weakest link in technical systems

Critical distinction: Vulnerability โ‰  Risk

A vulnerability in isolation is just a weakness. It becomes a risk only when:

  • A credible threat could exploit it (threat + vulnerability)
  • Exploitation would cause meaningful harm (impact)
  • The system is accessible to the threat (exposure)

Example: A web server has an unpatched critical vulnerability (CVE). Risk depends on:

  • Is it internet-facing? (Exposure โ€” high if public, low if internal-only)
  • Is there a public exploit? (Threat capability โ€” high if weaponized)
  • What data does it protect? (Impact โ€” high if customer PII, low if test environment)

Defender takeaway: Prioritize vulnerabilities based on exploitability, exposure, and impact โ€” not just severity score. A "critical" CVE in an offline system may be lower priority than a "medium" CVE in an internet-facing payment processor.

Lesson 5.3 ยท Risk: The Intersection of Threat, Vulnerability, and Impact

Definition: Risk is the potential for loss or harm when a threat exploits a vulnerability. It is calculated as a function of likelihood and impact.

Risk formula (conceptual):

Risk = Likelihood ร— Impact

Visual equation: Threat x Vulnerability x Impact = Risk
Risk is the product of Threat, Vulnerability, and Impact.

Where:

  • Likelihood: Probability that threat will exploit vulnerability
    Factors: Threat capability, vulnerability exploitability, exposure, existing controls
  • Impact: Magnitude of harm if exploitation succeeds
    Factors: Asset value, business criticality, data sensitivity, regulatory consequences

Risk matrix (qualitative approach):

Risk Assessment Matrix plotting Likelihood vs Impact, showing Critical (Red), High/Medium (Orange), and Low (Green) zones
A standard 3x3 Risk Matrix helps prioritize threats based on severity.

Example risk scenarios:

Example risk scenarios:

  • Critical Risk: Internet-facing payment server with known RCE exploit (high likelihood) + stores credit card data (high impact) = Patch immediately
  • Medium Risk: Internal dev server with XSS vulnerability (medium likelihood โ€” requires authenticated insider) + contains test data only (low impact) = Schedule fix, not emergency
  • Low Risk: Air-gapped system with buffer overflow (zero likelihood โ€” no network access) + non-critical data (low impact) = Defer until next maintenance window

Key insight: Risk is contextual

The same vulnerability has different risk levels in different contexts. A SQL injection flaw is:

  • Critical risk in production customer database
  • Medium risk in internal employee directory
  • Low risk in isolated test environment with no real data

Lesson 5.4 ยท Vulnerability Prioritization: Risk-Based Approach

Reality check: Organizations have thousands of known vulnerabilities. Attempting to fix them all wastes resources and delays fixing what actually matters.

Common mistake: CVSS score-based prioritization

Many organizations patch "critical" CVEs (CVSS 9.0+) first, regardless of context. This ignores exposure and impact:

  • CVSS 9.8 in offline backup system = Low actual risk
  • CVSS 6.5 in internet-facing authentication = High actual risk

Better approach: Risk-based prioritization

Prioritize based on the intersection of:

  1. Exploitability:
    • Is exploit code publicly available? (Weaponized CVEs are highest priority)
    • Is it being actively exploited in the wild? (Threat intelligence feeds)
    • How difficult is exploitation? (Authentication required? Physical access needed?)
  2. Exposure:
    • Is the vulnerable system internet-facing? (External > Internal)
    • Who can reach it? (Anyone > Authenticated users > Admins only)
    • Is it segmented from critical assets? (Blast radius analysis)
  3. Impact:
    • What data is at risk? (Customer PII > Employee data > Test data)
    • What business function depends on it? (Revenue-generating > Support systems)
    • Are there regulatory consequences? (HIPAA, PCI-DSS, GDPR fines)

Prioritization tiers:

  • Tier 1 (Patch immediately): Internet-facing + weaponized exploit + high-value data
  • Tier 2 (Patch this sprint): Internal systems + known exploit + medium impact
  • Tier 3 (Schedule for next quarter): Low exposure + theoretical vulnerability + low impact
  • Tier 4 (Accept risk): Air-gapped + no exploit + negligible impact

Real-world example: Equifax breach (2017)

Equifax had a known Apache Struts vulnerability (CVE-2017-5638) for months. It should have been Tier 1 priority:

  • โœ… Internet-facing web application (maximum exposure)
  • โœ… Public exploit code available within days (weaponized)
  • โœ… Protected access to 143 million consumer records (catastrophic impact)

Failure to prioritize correctly = $700M+ in costs, reputational destruction, CEO resignation.

Lesson 5.5 ยท Risk Treatment: Accept, Mitigate, Transfer, Avoid

Core principle: You cannot eliminate all risk. Organizations must decide how to respond to each identified risk based on tolerance, resources, and business objectives.

Four risk treatment strategies:

Decision framework:

For each identified risk, ask:

  1. Is this risk within our tolerance? (If yes โ†’ Accept; if no โ†’ continue)
  2. Can we eliminate the activity? (If yes and non-essential โ†’ Avoid; if no โ†’ continue)
  3. Can we mitigate to acceptable level? (If yes and cost-effective โ†’ Mitigate; if no โ†’ continue)
  4. Should we transfer financial impact? (If yes โ†’ Transfer; if no โ†’ re-evaluate tolerance or accept residual risk)

Residual risk: Risk that remains after controls are applied. All mitigation leaves some residual risk โ€” perfect security is impossible. Organizations must explicitly accept residual risk.

Self-Check Questions (Test Your Understanding)

Answer these in your own words (2-3 sentences each):

  1. What is the difference between a threat and a vulnerability? Can you have one without the other?
  2. Explain the risk formula (Risk = Likelihood ร— Impact). Why do both factors matter?
  3. Why is CVSS score alone insufficient for vulnerability prioritization? Give one example.
  4. What does it mean to "accept" a risk? When is this appropriate vs negligent?
  5. You find a critical vulnerability in a system. Walk through the decision framework: What questions would you ask before choosing a risk treatment strategy?

Lab 5 ยท Risk Assessment and Prioritization

Time estimate: 40-50 minutes

Objective: Conduct a structured risk assessment on a real system. You will identify threats and vulnerabilities, calculate risk, prioritize findings, and recommend treatment strategies with defensible justification.

Step 1: Choose Your System (5 minutes)

Select one system from this list (or propose your own with similar complexity):

Why it matters: Risk is contextual โ€” same vulnerability has different risk in different systems.

Step 2: Identify Assets and Their Value (10 minutes)

List at least 3 critical assets the system protects:

Example for healthcare portal:

Step 3: Identify Threats (10 minutes)

For each asset, identify at least one credible threat:

Example threats for healthcare portal:

Step 4: Identify Vulnerabilities (10 minutes)

For each threat, identify one vulnerability they could exploit:

Example vulnerabilities:

Step 5: Calculate Risk (10 minutes)

For each threat/vulnerability pair, assess risk using the matrix from Lesson 5.3:

Example risk calculation:

Step 6: Prioritize and Recommend Treatment (5 minutes)

Rank your identified risks from highest to lowest, then propose treatment for the top risk:

Example treatment plan:

Success Criteria (What "Good" Looks Like)

Your lab is successful if you:

Extension (For Advanced Students)

If you finish early, explore these questions:

๐ŸŽฏ Hands-On Labs (Free & Essential)

Apply threat, vulnerability, and risk thinking with beginner-friendly labs. Complete these before moving to reading resources.

๐ŸŽฎ TryHackMe: Security Principles

What you'll do: Work through core security principles like least privilege, defense in depth, and risk-based decision making.
Why it matters: This lab turns abstract risk concepts into concrete security choices you'll make throughout the degree.
Time estimate: 1-1.5 hours

Start TryHackMe Security Principles โ†’

๐ŸŽฎ TryHackMe: OWASP Top 10 (Intro)

What you'll do: Explore real-world vulnerability categories and how they map to risk (likelihood x impact).
Why it matters: Vulnerability awareness makes risk assessment realistic instead of theoretical.
Time estimate: 1.5-2 hours

Start TryHackMe OWASP Top 10 โ†’

๐Ÿ PicoCTF Practice: Web Exploitation (Beginner)

What you'll do: Attempt beginner web challenges that highlight common vulnerabilities and their impact.
Why it matters: Seeing vulnerabilities firsthand makes it easier to prioritize real risk over hypothetical risk.
Time estimate: 1-2 hours

Start PicoCTF Web Exploitation โ†’

๐Ÿ’ก Lab Tip: Keep a simple risk table: vulnerability, likelihood, impact, and priority. You'll reuse this structure throughout your degree.

Resources (Free + Authoritative)

Work through these in order. Focus on risk reasoning frameworks.

๐Ÿ“˜ NIST SP 800-30 - Guide for Conducting Risk Assessments

What to read: Chapter 2 "The Fundamentals" (pages 7-21) โ€” definitions of threat, vulnerability, risk.
Why it matters: Authoritative framework used by governments and enterprises. Teaches structured risk thinking.
Time estimate: 30 minutes (skim examples, focus on concepts)

Open Resource

๐Ÿ“˜ OWASP Threat Modeling

What to read: Introduction and "Getting Started" sections.
Why it matters: Practical guide to identifying threats before systems are built. Used in secure development.
Time estimate: 20 minutes

Open Resource

๐Ÿ“˜ FIRST CVSS Calculator - Understanding Vulnerability Scoring

What to explore: Use the interactive calculator to score a few example vulnerabilities (pick from recent CVEs).
Why it matters: Understand what CVSS measures (and what it doesn't โ€” context, exposure, business impact).
Time estimate: 15 minutes

Open Resource

๐Ÿ“˜ Cloudflare Learning - What is Defense-in-Depth?

What to read: Entire article on layered security approach.
Why it matters: Connects risk mitigation to practical control design. No single control is perfect.
Time estimate: 10 minutes

Open Resource

Tip: Completion and XP persist via localStorage. If progress doesn't update immediately, refresh once.

Weekly Reflection Prompt

Aligned to LO4 (Risk Reasoning) and LO8 (Integration)

Write 200-300 words answering this prompt:

Using your Lab 5 risk assessment, explain how you prioritized risks. Why did you choose to address certain vulnerabilities before others?

In your answer, include:

What good looks like: You explain the reasoning process, not just the outcome. You show understanding that risk is contextual โ€” same vulnerability has different priority in different systems. You demonstrate professional judgment: balancing perfect security (impossible) against acceptable risk (realistic).