Chapter 2: Threat Management and Cybersecurity Resources Flashcards
A type of test that attempts to exploit vulnerabilities just as a threat actor would
Penetration test
Why should pen testing be carried out?
Deep vulnerabilities can only be revealed through a simulated attack using the mindset of an actual threat actor
What are 3 advantages to using internal security personnel in a pen test?
- Low cost
- Fast
- Enhances training
What are 3 disadvantages to using internal security personnel?
- Insider knowledge
- Lack of expertise
- Reluctance to reveal findings
What are 4 advantages to using external consultants for pen testing?
- Expertise
- Credentials
- Experience
- Focus
What is the primary disadvantage to using external consultants in a pen test?
Use of discovered information
A monetary award for uncovering a software vulnerability
Bug bounty
What are three advantages to crowdsourcing pen testing?
- Fast
- Flexible
- Wide scope
Scans for vulnerabilities and exploits them in a pen test
Red team
Monitors for attackers and shores up defenses as necessary in a pen test
Blue team
Enforces the rules in a pen test
White team
Provides feedback to defenders and attackers during pen test
Purple team
A type of pen test where the attackers have no knowledge of the network nor special privileges
Black box
A type of pen test where the attackers are given limited knowledge of the network and some elevated privileges
Gray box
A type of pen test where attackers are given full knowledge of the network and the source code of applications
White box
Limitations or parameters on the pen test
Rules of engagement
What are 7 elements of the rules of engagement?
- Timing
- Scope
- Authorization
- Exploitation
- Communication
- Cleanup
- Reporting
Less technical element of a report aimed at those in charge
Executive summary
A process, involving determination, resolve, and perseverance, in which a load balancer crates a link between an endpoint and a specific network server for the duration of a session
Persistence
Gathering information from outside the organization
Footprinting
Directly probing for vulnerabilities and useful information
Active reconnaissance
Searching for wireless signals from an automobile or on foot while using a portable computing device
War driving
An efficient means of discovering a WiFi signal using drones
War flying
An unmanned aerial vehicle without a human pilot
Drone
An aircraft without a human pilot on board to control its flight
Unmanned aerial vehicle (UAV)
Searching online for publicly accessible information
Passive surveillance
Publicly accessible information
Open source intelligence (OSINT)