6. Security Assessment And Training Flashcards
Define Vulnerability Testing.
Identifying weaknesses in physical, administrative and logical systems
Define penetration testing
Ethics hacking to validate discovered weaknesses.
Define black box testing
Zero knowledge of network at start of penetration testing.
Define grey box testing
Partial knowledge at start of penetration testing
Define white box testing
Full knowledge of network at start of penetration testing
What are the steps of Attack Methodology?
- Reconnaissance
- Foot printing - mapping network (Nmap)
- Fingerprinting - identifying host info.
- Vulnerability assessment - identifying weaknesses in system configuration.
- Attack - penetration and privilege escalation.
What are the 3 basic requirements of penetration testing?
- Meet with senior management to determine the goal.
- Document rules of engagement.
- Get sign off from senior management.
What is the purpose of penetration testing?
To determine subjects ability to withstand an attack and determine effectiveness of current security measures.
What are the 3 types of penetration testing?
- Physical - get into physical area/remove materials or place marker in.
- Administrative - get sensitive information from users.
- Logical security - attacks on systems, networks or communications.
Which IDS can read encrypted data?
HIDS
Define NDS
Network based Intrusion Detection System.
Focuses on the whole network and the machines on it. Acts as a traffic collector.
Disadvantages: data must be decrypted. Switches cause issues because of port spans.
Define HIDS
Host based IDS.
Disadvantages: only protects one machine, can be disabled, scalability is costly, uses local resources.
Define the two types of Analysis Engines?
- Pattern matching - signature based on data from attacker to victim.
- Profile Matching - looks for change in “normal” behavior. System builds profile from watching work for a few weeks and then goes into action.
What are issues with each type of analysis engine?
- Pattern matching - must pay for signature subscription, does not stop 0 day attacks.
- Profile matching - lots of false- positives, often ignored due to frequency of false positives. Requires someone very skilled to use it.
What is the damager of honey pots?
Enticement vs entrapment.