comptia security+ Audits and Assessments

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

Audits

Systematic evaluations of an organization's information systems, applications, and security controls.

2
New cards

Internal Audits

Audits conducted by the organization's own team.

3
New cards

External Audits

Audits performed by third-party entities.

4
New cards

Purpose of Audits

Validate security measures, identify vulnerabilities, and maintain regulatory compliance.

5
New cards

Internal Audit Example

Reviewing data protection policies for relevance and compliance.

6
New cards

External Audit Example

Evaluating PCI DSS compliance for an e-commerce system, including network security and encryption.

7
New cards

Significance of Audits

Helps identify security gaps and ensures compliance with regulations like GDPR, HIPAA, PCI DSS.

8
New cards

Assessments

Detailed analyses to identify vulnerabilities and risks, often performed before major system changes.

9
New cards

Types of Assessments

Risk Assessments, Vulnerability Assessments, Threat Assessments.

10
New cards

Internal Audits and Assessments

Review internal processes and compliance to ensure operational effectiveness.

11
New cards

External Audits and Assessments

Independent evaluations verifying financial, compliance, and operational practices.

12
New cards

Penetration Testing (Pentesting)

Simulated cyber attacks to identify vulnerabilities; also called ethical hacking.

13
New cards

Reconnaissance in Pentesting

Initial information-gathering phase of a pentest, can be passive or active.

14
New cards

Reconnaissance Types

Passive (indirect info gathering) and Active (direct interaction like port scans).

15
New cards

Environments in Pentesting

Known (insider view), Partially Known (limited info), Unknown (external attacker simulation).

16
New cards

Attestation of Findings

Formal declaration of audit/assessment results to confirm accuracy and document outcomes.

17
New cards

Internal Audit Focus Areas

Data protection, access controls, network security, incident response procedures.

18
New cards

Internal Audit Process

Review policies, examine access, test controls, document findings and make recommendations.

19
New cards

Audit Committee

Board-level group overseeing audits, compliance, and financial reporting.

20
New cards

Internal Assessments

Identify and evaluate system risks before implementation or changes.

21
New cards

Self-Assessments

Internal checks for standards/regulation compliance (e.g., threat modeling, vulnerability scans).

22
New cards

Assisted Internal Assessments

Performed by dedicated groups using tools like checklists and guided evaluations.

23
New cards

MCIT Cybersecurity Checklist

Used to identify and correct cybersecurity risks; contains yes/no questions and action items.

24
New cards

Collaborative Internal Assessment

Involves various departments like IT, administration, and cybersecurity teams.

25
New cards

External Assessments

Third-party analysis identifying system vulnerabilities using tools and manual testing.

26
New cards

External Assessment Examples

HIPAA compliance assessment using checklists and required documentation.

27
New cards

Preparing for HIPAA Assessment

Answer checklist questions and provide evidence files to demonstrate compliance.

28
New cards

Penetration Testing Types

Physical, Offensive (Red Team), Defensive (Blue Team), and Integrated (Purple Team).

29
New cards

Physical Penetration Testing

Tests physical controls like locks and cameras for vulnerabilities.

30
New cards

Offensive PenTesting (Red Teaming)

Actively exploit vulnerabilities to simulate real-world attacks.

31
New cards

Defensive PenTesting (Blue Teaming)

Monitors and strengthens defenses, responds to attacks, and improves detection.

32
New cards

Integrated PenTesting (Purple Teaming)

Combines red and blue team efforts for a full security picture.

33
New cards

Metasploit

A powerful tool used in penetration testing for exploiting vulnerabilities.

34
New cards

Attestation in Pentesting

Proves a pentest occurred and confirms findings; often required for compliance.

35
New cards

Difference: Attestation vs. Report

Attestation includes evidence; report provides findings and remediation steps.

36
New cards

Types of Attestation

Software (software integrity), Hardware (hardware integrity), System (security posture).

37
New cards

Attestation in Internal Audits

Validates compliance and control effectiveness within the organization.

38
New cards

Attestation in External Audits

Third-party confirmation of financials, regulatory adherence, and operations.