Chapter 15 Flashcards
What provides an important mechanism for validating the ongoing effectiveness of security controls?
Security Assessment and Testing Program
What uses automated tools to search for known vulnerabilities in systems, applications, and networks.
Vulnerability Assessments
What takes the results of test inputs from penetration testing and vulnerability assessments and implements a risk management process.
Vulnerability Management
What uses a peer review process to formally or informally validate code before deploying it in production?
Code Review
What evaluates the security of software without running it by analyzing either the source code or compiled application.
Static Software Testing
What évaluâtes the security of if software in a runtime environment and is often the only option for orgs deploying applications written by someone else.
Dynamic Software Testing
What uses modified inputs to test software performance under unexpected circumstances.
Fuzzing
What modifies known inputs to generate synthetic inputs that may trigger unexpected behavior.
Mutation Fuzzing
What develops inputs based on models of expected inputs to perform the same task.
Generational Fuzzing
What occurs when a third party performs an assessment of the security controls protecting an organization’s information assets.
Security Audits
What are performed by an organization’s internal staff and are intended for management use.
Internal Audits
What SOC engagement Assess the organization’s controls that might impact the accuracy of financial reporting.
SOC 1 Engagement
What SOC engagement Assess the organization’s controls that affect the security (confidentiality, integrity, and availability) and privacy of information stored in a system.
SOC 2 Engagements
What SOC engagement Assess the organization’s controls that affect the security (confidentiality, integrity, and availability) and privacy of information stored in a system. However, audit results are intended for public disclosure.
SOC 3 Engagement
What report type focuses on the auditor’s opinion based on the description provided by management and the suitability of the design of the controls, and cover only a specific point in time.
Type I
What report type focuses on auditor’s opinion on the operating effectiveness of the controls, and also an extended period of time such as 6 months.
Type II
What describes a standard approach for setting up an information security management system, and goes into more detail on the specifics of information security controls.
ISO 27002
What is common framework for conducting audits and assessments.
COBIT
What are the components of SCAP most directly related to vulnerability assessment
CVE
CVSS
CCE
CPE
XCCDF
OVAL
What provides a naming system for describing security vulnerabilities.
CVE