Chapter 5: Security Assessment and Testing

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Vulnerability Management

Practice of finding and mitigating the vulnerabilities in computers and networks

2
New cards

Asset Map

Used to identify existing strengths and resources in the target region

3
New cards

Risk appetite

willingness to tolerate risk within the environment

4
New cards

Payment Card Industry Data Security Standard (PCI DSS)

corporate policy for payment card security standards

5
New cards

Federal Information Security Management Act (FISMA)

corporate policy for cybersecurity management

6
New cards

scan sensitivity level

These settings determine the types of checks that the scanner will perform and should be customized to ensure that the scan meets its objectives while minimizing the possibility of disrupting the target environment

7
New cards

Operating System (OS)

The system software that controls the way in which a computer system functions, including the management of hardware, peripherals, and software.

8
New cards

credentialed scanning

-credentialed scan is a scan that is performed by someone with administrative rights to the host being scanned

-Operations are executed on the host itself rather than across the network.

- There is a more definitive list of missing patches.

- Client-side software vulnerabilities are uncovered.

= A credentialed scan can read password policies, obtain a list of USB devices, check antivirus software configurations, and even enumerate Bluetooth devices attached to scanned hosts.

9
New cards

Qualys

A cloud-based vulnerability management solution with installed sensor agents at various points in their network and the sensors upload data to the cloud platform for analysis

10
New cards

Security Content Automation Protocol (SCAP)

A method of using specific protocols and data exchanges to automate the determination of vulnerability management, measurement, and policy compliance across a system or set of systems.

11
New cards

Static Testing

Testing of a software development artifact, e.g., requirements, design or code, without execution of these artifacts, e.g., reviews or static analysis.

12
New cards

dynamic testing

Testing that involves the execution of the software of a component or system.

13
New cards

Interactive Testing

combines static and dynamic testing, analyzing the source code while testers interact with the application through exposed interfaces

14
New cards

Common Vulnerability Scoring System (CVSS)

A risk management approach to quantifying vulnerability data and then taking into account the degree of risk to different types of systems or information.

15
New cards

Attack Vector Metric

A metric that describes how an attacker would exploit a vulnerability.

16
New cards

Attack Complexity Metric

A metric that describes the difficulty of exploiting a vulnerability.

17
New cards

Privileges Required Metric

Describes the type of account access that an attacker would need to exploit a vulnerability

18
New cards

interaction metrics

describes whether the attacker needs to involve another human in the attack.

19
New cards

confidentiality metric

describes the type of information disclosure that might occur if an attacker successfully exploits the vulnerability.

20
New cards

Integrity Metric

describes the type of information alteration that might occur if an attacker successfully exploits the vulnerability

21
New cards

availability metric

describes the type of disruption that might occur if an attacker successfully exploits the vulnerability

22
New cards

Scope Metric

describes whether the vulnerability can affect system components beyond the scope of the vulnerability

23
New cards

CVSS Vector

A vector that uses a single-line format to convey the ratings of a vulnerability on all six of the metrics.

24
New cards

CVSS Base Score

A single number representing the overall risk posed by the vulnerability.

25
New cards

Log reviews

Following a vulnerability scan, it is important to review the log files/reports that list any potential vulnerabilities.

26
New cards

Security Information and Event Management (SIEM)

A method for analyzing risk in software systems. It is a centralized collection of monitoring of security and event logs from different systems. SIEM allows for the correlation of different events and early detection of attacks.

27
New cards

configuration management systems

provide information on the operating system and applications installed on a system

28
New cards

legacy platforms

used to describe systems that are no longer being marketed or supported

29
New cards

Weak configurations

Configuration settings that are not properly implemented, resulting in vulnerabilities

30
New cards

debug modes

The feature that gives developers crucial error information needed to troubleshoot applications in the development process.

31
New cards

File Transfer Protocol (FTP)

A communications method for transferring data between computers on the Internet

32
New cards

Weak encryption

Encryption that is relatively easy or simple to decrypt without the encryption key.

33
New cards

Penetration Testing

Professional hacking to access data and computing power without being granted access; professional pen-testers are hired to identify and repair vulnerabilities and only work once, given written permission to obtain ungranted access.

34
New cards

White box tests

are a type of software test in which the tester understands how the software works internally

35
New cards

black box test

A type of penetration test. Testers have zero knowledge of the environment prior to starting the test. Compare with gray box test and white box test.

36
New cards

Gray Box Testing

Testers have some knowledge of the environment but do not have access to all documentation or data.

37
New cards

Bug Bounty Program

a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs

38
New cards

rules of engagement

established rules or directives used by military forces that define the circumstances, conditions, degree, and manner in which the use of force, or actions which might applied

39
New cards

reconnaissance

exploration to gain knowledge or information

40
New cards

Priviledge escalation

a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications