Chapter 10 - Cyber security tools, techniques and reporting Flashcards
What are some types of penetration testing?
Network discovery
Vulnerability probing
Exploiting vulnerabilities
Internal network penetration testing
Web application penetration testing
Wireless network penetration testing
Simulated phishing testing
What are the different levels of software security?
Level 1 - prevention of access to software from unauthorised sources
Level 2 - writing detection of unauthorised access into software
Level 3 - writing response into the software, alerting appropriate teams/departments to investigate the breach
What are the other considerations in software security?
Design review
Code review
Security testing
What are the 6 actions for an organisation to consider in digital resilience?
Identify all the issues
Aim toward a well-defined target
Work out how best to deliver the new cyber security system
Establish the risk resource trade offs
Develop a plan that aligns business and technology
Ensure sustained business engagement
What are the three elements of AIC triad?
Availablitiy
Integrity
Confidentiality
What are the three components of National institutes of standards and technology in the US?
Implentation tiers
Core - provides a set of cyber security activies, based on five principles: Identify, Protect, Detect, Respond, Recover
Profiles
What are the three key components in the report to stakeholders about cyber security according to AICPA?
Managements description
Managements assertion
Practitioners opinion
What is forensic analysis?
Reviewing cyber crime scene.
System level analysis - look to identify what changes have been made
Storage analysis - as amount of storage increases easier to hide stuff
Network analysis - Help identify patterns in network activity prior to an attack
How do we do malware analysis?
Reverse engineering - deconstruct malware to learn more about it
Decompilation and disassembly - involves understanding how it was and what malware was designed to do