Ch.15 Flashcards
in software development, the process of defining a collection of hardware and software components along with their interfaces in order to create the framework for software development
architectural design
the code that can be executed by unauthorized users in a software program
attack surface
gathering information from messages that a service transmits when another program connects to it
banner grabbing
a comparison of the present state of a system to its baseline
baseline reporting
a penetration test in which the tester has no prior knowledge of the network infrastructure that is being tested
Black box
in software development, presenting the code to multiple reviewers in order to reach agreement about its security
code review
an analysis of the design of a software program by key personnel from different levels of the project
design review
a penetration test where some limited information has been provided to the tester
gray box
the process of eliminating as many security risks as possible to make the system more secure
hardening
a network set up with intentional vulnerabilities to invite attacks and reveal attackers’ methods
honeynet
a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, but are actually imitations of real data files, to trick attackers into revealing their attack techniques
honeypot
an agreement between parties intended to minimize security risks for data transmitted across a network
Interconnection Security Agreement (ISA)
an agreement through which parties in a relationship can reach an understanding of their relationships and responsibilities
interoperability agreement
a scan that attempts to penetrate the system in order to perform simulated attack
intrusive vulnerability scan
an agreement between two or more parties to enable them to work together that is not legally enforceable but is more formal than an unwritten agreement
Memorandum of Understanding (MOU)
a scan that does not use credentials (username and password) to conduct an internal vulnerability assessment
non-credentialed vulnerability scan
a scan that uses only available information to hypothesize the status of the vulnerability
non-intrusive vulnerability scan
the termination of an agreement between parties
off-boarding business partners
the start-up relationship agreement between parties
on-boarding business partners
a test by an outsider that attempts to actually exploit any weaknesses
penetration testing