Chapter 1 key terms Flashcards
Ethical hacker
A person who hacks into a computer network in order to test or evaluate its security rather than with malicious or criminal intent.
vulnerability
A weakness in an information system or in system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
penetration testing
Security testing in which evaluators mimic real-world attacks in an attempt to identify ways to circumvent the security features of an application, a system, or a network.
threat actor
A person or group who is responsible for a security incident. The main categories of threat actors are organized crime, insider threat, state sponsored, and hacktivist.
insider threat
A threat that occurs when an entity has authorized access and could potentially harm an information system or enterprise through destruction, disclosure, modification of data, and/or DoS.
Open Web Application Security Project (OWASP)
A nonprofit organization with local chapters around the world that provides significant guidance on how to secure applications.
MITRE ATT&CK
A penetration testing framework/methodology.
Resource for learning about an adversary’s tactics, techniques, and procedures
National Institute of Standards and Technology (NIST)
The National Institute of Standards and Technology, which is a part of the U.S. Department of Commerce that helps provide organizations with guidelines on planning and conducting information security testing.
Open Source Security Testing Methodology Manual (OSSTMM)
A document that lays out repeatable and consistent security testing.
Penetration Testing Execution Standard (PTES)
A penetration testing methodology standard/guidance document that provides information about types of attacks and methods and also provides information on the latest tools available to accomplish the testing methods outlined.
seven phases
Information Systems Security Assessment Framework (ISSAF)
A penetration testing methodology that consists of the following phases: information gathering, network mapping, vulnerability identification, penetration, gaining access and privilege escalation, enumerating further, compromising remote users/sites, maintaining access, and covering the tracks.
9 phases
vulnerability scanning
A technique used to identify hosts or hosts’ attributes and associated vulnerabilities.