Ch18 - 18.01 - Understanding Types of Assessments Flashcards

1
Q

Risk Assessment (Analysis)

A

Risk assessment is also known as risk analysis and deals with identifying the risks to assets within the organization and then finding solutions to minimize those risks.

  1. Identify assets
  2. Identify threats (risk) against assets (Threat assessment)
  3. Analyze impact
  4. Prioritize threats
  5. Mitigate the threat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Assessment

A

Threat assessment is actually part of risk assessment, where you identify the different threats to an asset. As mentioned, you will have many different threats for a single asset, and part of risk assessment is to prioritize those threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Configuration Assessment

A

With a configuration assessment, the security administrator will review the security configuration of a system or network. This typically involves having a checklist of configuration best practices and ensuring that those best practices are followed. The following is a list of assets whose configuration you would check:

  1. All systems
  2. File server
  3. Web server
  4. SMTP server
  5. DNS server
  6. Routers
  7. Firewalls
  8. Switches
  9. Employees
  10. Physical security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Configuration Assessment - Employees

A

When performing a manual assessment, also assess
employees’ knowledge of security by planning and executing a few social engineering attacks against them. For example, you could see if an employee would give their password away. Or put CDs with no labels on them on a few employees’ desks, and see how many of those
employees put the CD in their systems. The idea here is that the CD could have been a virus, and employees should not put unknown media in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability Assessment

A

A vulnerability assessment is an assessment where you identify areas in the configuration that make your system vulnerable to an attack or security incident. Most vulnerability assessments are automated by using a vulnerability assessment tool such as Microsoft Baseline Security Analyzer (MBSA), GFI LanGuard (see Figure 18-1), or Nessus.

Remember that vulnerability assessments are considered passive assessments because you are not actually trying to bypass security controls and hack a system.

Some of the items that a vulnerability assessment
would check for:
1. Unused accounts
2. Administrative accounts
3. Unpatched operating system
4. Unpatched software
5. Vulnerable software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability Assessment - Credentialed vs. non credentialed

A

When performing a vulnerability scan, you should ensure that you perform one as an unauthenticated user (non-credentialed) to find out what information is being exposed to unknown persons to the network. You then should perform the scan logged in as an administrative account so that you can collect as much information about the system as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Penetration Testing

A

A penetration test is a totally different type of security assessment than a vulnerability assessment. With a penetration test, the tester uses common attack methods to see if they can bypass the security of a system. If the penetration tester cannot compromise the system by using common exploits, then the system passes the test. Otherwise, if the system is compromised, the system fails the test and the penetration tester reports on the findings and on how to secure the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Legal Issues

A

Always ensure before performing any kind of penetration test that you have a legal document drafted by a lawyer stating that you have been given permission to perform such a test. Ensure that upper-level management of the organization asking you to do the penetration test sign the document. This is known as penetration testing authorization. You should also get authorization before performing a vulnerability scan—this is known as vulnerability testing authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Testing

A
  1. Blackbox test
  2. White box test
  3. Gray box test
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Black box test

A

When performing a black box test, or hiring a pentester
(penetration tester) to do a black box test, the goal is to give the tester no information on the organization or its network configuration. The tester will have to act as a hacker and discover the details of the organization and its configuration on their own and then simulate the
attacks. This type of test would take the longest because the tester has to figure out what assets you have before trying to compromise them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

White box test

A

With a white box test, you, or the consultants you hire
to do the test, are given all the details about the organization’s assets and configuration. In this type of test, the goal is to see if the systems can be compromised. Although this type of test is quicker than the black box test, it does not give you any idea of how easy or hard it may be for someone to discover information about your organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Gray box test

A

A gray box test is in the middle; the tester gets some
details about the organization and its configuration, but only limited details. For example, the tester may get a list of IP addresses used by the organization and have to figure out what is running on those IP addresses and then simulate an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Baseline Reporting

A

Baseline reporting involves capturing a baseline of the system—what the system looks like under normal working conditions—and then comparing that baseline to performance data. Baseline reporting is typically used in security incidents that involve a denial of service or malware incident in which the system is not performing to expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Code Review

A

Being a bit of a programmer, I hate to say it, but most security problems result from developers creating applications in an unsecured way. For example, it is a critical rule of secure coding to ensure that you validate any data sent to the application because if you do not, a hacker could perform an SQL injection attack or a buffer overflow attack. Take time to ensure that regular code reviews of the software developed in house are performed. Have a specific security tester go through all the application code that your developers write and look for mistakes in the code that could cause a security issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attack Surface

A

Attack surface refers to the software and services running on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ring Architecture

A

Another technique used to assess the security of a system or network is to look into the architecture of the system. For example, computer processors use a ring architecture to run software. Software running in the lower rings (ring 0 is the lowest) has more privileges than software running in higher rings. Part of the ring architecture is that software running in a ring can access resources at that ring or higher. Therefore, core operating system code that runs in ring 0 can access anything in rings 1, 2, and 3. But applications running on the system, which run in ring 3, cannot access core operating-system code and as a result, cannot corrupt those processes.

17
Q

Design Reviews

A

Another tool you can use to assess security is to perform design reviews before and after a solution is implemented. It is also critical to identify a system’s security concerns right from the start so that you can claim a secure by design status (meaning security was a focus from beginning to end with the creation of the solution). Once the solution has been completed, whether it be an application or network solution, do a design review and ensure that what was requested as a solution is actually what has been implemented.