Certified Ethical Hacker. Ch 1 - 3 Flashcards
What are the 5 phases in hacking?
Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks
Information Assurance includes
Confidentiality,
Integrity,
Availability,
Authenticity
Set of requirements, processes, principles, and models that determines the structure and behavior of an organization’s information systems
EISA (Enterprise Information Security Architecture)
Risk Management Phases
Risk Identification Risk Assessment Risk Treatment Risk Tracking Risk Review
What is a risk assessment approach for analyzing security of an application by capturing, organizing, and analyzing all the information that affects the security of an application
Threat Modeling
What is User Behavior Analytics (UBA)
The process of tracking user behavior to detect malicious attacks, potential threats, and financial frauds
IAM Component 1, Includes single sign on, session management, password services, strong authentication and multi factor
Authentication
IAM Component 2, Provides access control to various organizational resources
Authorization
IAM Component 3, Performs user life cycle management and password management
User Management
IAM Component 4, Provides central user repository that stores user identity information and enables other components and services of IAM
Enterprise Directory Services
Protocols used by Enterprise Directory Services
- LDAP, Lightweight Directory Access Protocol
- SCIM, Simple Cloud Identity Management
Protects the penetration tester / agency from any legal or financial liabilities, in case the penetration test results in loss or damage to the assets of the organization
Indemnification Clause
An open source application security project that assists the organizations to purchase, develop and maintain software tools, software applications, and knowledge-based documentation for Web application security
OWASP, Open Web Application Security Project
A peer-reviewed methodology for performing high quality security tests such as methodology tests: data controls, fraud and social engineering control levels, computer networks, wireless devices, mobile devices, physical security access controls and various security processes
OSSTMM, Open Source Security Testing Methodology Manual
An open source project aimed to provide a security assistance for professionals. The mission is to research, develop, publish, and promote a complete and practical generally accepted information systems security assessment.
ISSAF, Information System Security Assessment Framework
The federal technology agency that works with industry to develop and apply technology, measurements, and standards
NIST
What clause specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within the context of the organization?
ISO/IEC 27001:2013
Protects investors and the public by increasing the accuracy and reliability of corporate disclosures
Sarbanes Oxley Act
A comprehensive framework for ensuring the effectiveness of information security controls over information resources that support federal operations and assets
FISMA
Google Hacking Database (GHDB) is?
An index of search querys used to find publicly available information used in pentesting.
What tool is used on Linkedin to find people based on job title, company, or email address?
InSpy
Tool to determine the operating system (or top level domains) used by a target
Netcraft
Search engine to find connected devices (routers, servers, IoT,) used by a target
SHODAN
Search engine used to ask questions about the hosts and networks that compose the Internet
Censys