Cybersecurity Testing Flashcards

1
Q

Define cybersecurity.

A

Refers to protecting computer systems, including their electronic data, software and hardware, from theft or damage as well as disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are assets in cybersecurity?

A

Valued data/computerized assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the CIA Triad? What are its assets?

A

Describes the security attributes of assets

  1. Confidentiality: material should only be entrusted to designated parties for specific groups
  2. Integrity: dependent on assurance that material has not been tampered with via unauthorized access
  3. Accessibility: data/service is available only to authorized users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three elements of criminality? Define them.

A
  1. Motive: malicious individuals and groups might be motivated by greed, revenge, or ideology
  2. Means: knowledge, skills, and resources to take advantage of an opportunity
  3. Opportunity: vulnerabilities in cybersecurity controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of cybersecurity testing? What does it provide?

A

Probes systems to reveal potential failures in furnishing desired level of security.

Provides verification and validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is threat modeling? (i.e., what does it anticipate?)

A

Anticipates the nature of assaults that might be encountered in the operating environment of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Specification of what the system __________ is often less difficult than elaborating what the system __________.

A

Should do; should not do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List four cybersecurity differences.

A
  1. It must be responsive to a rapidly changing environment.
  2. The adequacy of established controls is under constant active probing.
  3. Cybersecurity testing must address detection, response, and recovery after controls fail.
  4. Human shortcomings are at least as prominent as technological challenges.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When do vulnerabilities appear?

A

They can either lay dormant for years before exposure or appear with new development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are threat actors?

A

Individuals with varying motivations and skills that will expose control weaknesses and at times will expose it to other threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cybersecurity testing must evaluate ___________.

A

How well risk mitigation supplements risk avoidance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the leading cause of security failures?

A

Social engineering (exploits through low-tech means)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the overall goal of cybersecurity testing?

A

To reduce overall risk exposure to an acceptable level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List and define the two cybersecurity test approaches.

A
  1. Risk avoidance: lowering the probability of when a threat might take advantage of a vulnerability
  2. Risk mitigation: decreasing the consequences of when a vulnerability is taken advantage of
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are dynamic security issues?

A

Issues that can only be seen during execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List and define the five stages of cybersecurity testing.

A
  1. Identify: confirm identification, categorization, and prioritization of the data and processes to be safeguarded
  2. Protect: analyze the protection of each asset category with corresponding controls that will stop or slow attempts to compromise the system
  3. Detect: demonstrate the ability to detect intrusion and provide timely actionable analysis
  4. Respond: exercise the responses and determine how well affected parties are notified, damage is minimized, and further access is shut off
  5. Recover: demonstrate the speed and extent of recovering operational status and restoring data and confidence
17
Q

What needs to be done to avoid cybersecurity testers from being mistaken for malicious insiders?

A

All cybersecurity testing must be pre-authorized in writing by appropriate management

18
Q

What two modes of cybersecurity testing should be conducted? Define them.

A
  1. Black box testing: attends to external system behaviors; “outsider” will gather information via system reconnaissance and use that information to craft attacks
  2. White box testing: utilizes structural knowledge of the system as-built; “insider” threat is modeled by treating the system’s internals as visible and exploitable
19
Q

What is fuzzing?

A

Inserting random variations of expected input values to detect sensitivities that might be exploited

20
Q

What is Red Team vs. Blue Team?

A

Derived from the military where team of attackers (red team) is pitted against team of defenders (blue team).

21
Q

Targeted tests should probe the adequacy of what specific controls? (This is a long list of items having to do with cybersecurity.)

A
  • policy and procedure enforcement
  • system hardening: reducing the attack surface by eliminating as many security risks as possible
  • access control mechanisms for authentication, authorization, and accountability
  • input validation
  • encryption
  • error and exception handling
  • intrusion detection
  • malware scanning
  • resistance to social engineering