1.7 Summarize the techniques used in security assessments Flashcards
Intelligence Fusion
Taking big data and use data analytics to identify potential threats
Threat Feeds
Additional sources that provide information on attack vectors
Maneuvers
Automated system that combats threats. (Big data that is analyzed and if a threat is there, the system blocks it.)
Vulnerability Scanning
Scans data from a Threat Actor perspective on for weakness
Non-Intrusive Scan
Gather info on vulnerability but doesn’t act on it.
Intrusive Scan
Gather info on vulnerability but DOES act on it.
Non-credential Scans
Threat Actor that DOES NOT a login to access your network and looks for vulnerabilities
Credential Scans
Threat Actor that DOES HAVE RIGHTS to the network and will try to find vulnerabilities for a USER perspective
Where to Scan for Vulnerabilities
Apps, Web App, andNetwork
CVE Data Base
Common Vulnerability and Exposure. Data base that is a summary of vulnerabilities.
CVSS
A data base that scores the vulnerability on how severe it is.
CVSS Versions
2.0 and 3.0 both have different scoring
Vulnerability scan LOG REVIEW
A log that displays vulnerabilities with Security Controls, Misconfigurations, and Real vulnerabilities (newer ones)
False Positives
A vulnerability is identified but doesn’t really exist
False Negative
A vulnerability exists, but the scan didn’t detect it.