5.5 Flashcards
Audits and assessments, penetration tests
The provision of an opinion of truth or accuracy of an audit, commonly for cybersecurity
Attestation
The group that is responsible for all of the risk management in an organization, and the group that starts and stops internal audits.
Audit committee
The part of an audit that includes viewing records, compiling reports, and gathering specific details about the audit and its scope
Hands-on research
Examination
The part of the audit that gets into the trenches of evaluating an organization’s policies and procedures, and how well they are carried out by employees.
This is the part that looks for potential improvements.
Assessment
A penetration test that involves attempting to gain access to a building or physical hardware by circumventing physical security procedures
Physical penetration test
The aspect of pentesting that involves attacking systems and looking for vulnerabilities to exploit
AKA the red team
Offense
The aspect of pentesting that involves identifying attacks in real-time and preventing unauthorized access.
AKA the blue team
Defense
The method of pentesting that is the best to use. It involves utilizing both red team and blue team methods to create a constant feedback loop on itself.
Integrated
A type of penetration test where the tester is given some information about the systems, applications, and network layout of the organization beforehand.
This is used when you want the tester to be sure to attack certain systems in the organization.
Partially known environment
A type of penetration test where the tester is given full disclosure of all systems, applications, and network layout of the organization beforehand.
Known environment
A type of penetration test where the tester is given no information about the systems, applications, or network layout of the organization beforehand.
The tester goes in blind and figures it out throughout the test.
AKA a “blind” test
Unknown environment
The process used by a penetration tester to gather as much information as possible about an environment.
Specifically, they look for OS types, what applications are installed, if there are firewalls, how many ports are open, where the routers are, if there are subnets, etc.
Reconnaissance
The type of reconnaissance that involves looking for information from open sources. This might involve:
Social media
Corporate websites
Online forums
Social engineering
Dumpster diving
Talking to third-party companies that do business with that organization to discern what they know about the infrastructure
Passive reconnaissance
The type of reconnaissance that involves actually going into the network and querying its devices. This involves the risk of being noticed by an IPS or an admin. This might involve:
Ping scans
Port scans
DNS queries
OS scans/OS fingerprinting
Service scans
Version scans
Active reconnaissance