Domain 6 Flashcards

1
Q

Information Security Assesment

A

Information Security Assesment is the process of determinig how effectively the entity being evaluated meets specific security criteria (assirance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examination

A

Examination (E) is the process of interviewing, reviewing, inspecting, studying, and observing to facilitite understaing comparing to standards or baselines, or to obtain evidence.
Examinations are used to determine if the assessment object is properly documented and to gain operational insight regarding effectiveness, suitability and survivability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examination properties

A
  • Examination generally focus the policies, standards, baselines, procedures, plans, programs, configuration, settings, output, and reports.
  • Examinations are considered a passive activity with minimal (if any) anticipated operational impact.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Testing

A

Testing is used to identify vulnerabilities (weakness), substantiate strentghs, and predict the likelihood of exploitation.

  • Testing techniques may include vulnerability assessments, penetration testing, password cracking, and social engineering as well as incident response and disaster response/business continuity exercises.
  • Testing can be intrusive and can have an opeational impact.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rules of Engagement (ROE)

A

Rules of Engagement (ROE) document details the parameters and expected assesor conduct of the assessment (exam-test).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rules of Engagement (ROE) Components

A

ROE components include:

  • Scope
  • Level of expertise / methodology
  • Data Handling requirements
  • Reporting expectations
  • Assesor responsabilities.
  • Legal Considerations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rules of Engagement (ROE) Component: Scope

A

Seleccion of assesment objects are influenced by system criticality, information sensitivity, regulatory requirements, and contractual obligations.

  • Size of the system being assesed.
  • Complexity of the environment.
  • Feasibility of sampling.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rules of Engagement (ROE) Component: Sampling

A

Sampling is used to infer characteristics about a population based upon the characteristics of a sample.

  • Evidence sampling is applying a procedure to less than 100% of the population.
  • Sampling risk is where the assessor’s conclusion is based on a sample that might be different if they examined or tested the entire population.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sampling Techniques.

A
  • Statistical Sampling
  • Non-statistical Sampling
  • Block Sampling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Statistical Sampling

A

A objective method for determining sample size and selection criteria.
- Each item should have a equal probability of selection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Non-statistical Sampling

A

A subjective method of determinig which items are the most materail, relevant and/or risky.
- Included items are based on professional judgement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Block Sampling

A

All Items in a selected time period, numerical sequence, or alphabetical sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rules of Engagement (ROE) Component: Logistics

A

Logisitcal considerations include location, timing, and notification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rules of Engagement (ROE) Component: Assesor Challanges

A

Security assessor ofter face technical, operational, and political challanges.

  • Resistance from business owners, system, and network administrators, and end users.
  • Re-assessment fixes.
  • In-the- moment mitigation.
  • Restricted time windows.
  • Evolving Technology.
  • Teisk of operational impact.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rules of Engagement (ROE) Component: Legal Considerations

A

Legal conderations include authorization, liability, indemnification, nondisclosure, and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Documet that detailks the parameters of an assesment

A

Rules of Engagement (ROE)

17
Q

Penetration Testing

A

The Objective of Penetration Testing is to evaluate the security of a target by identifying and attempting to exploit (actual or proof of concept) weakness in the target environment.

  • Not to be confuresed with a vulnerability scan which looks for knonwn vulnerabilities in the target environment and reports potential exposures.
  • Testing methodology can be manual, automated, or hibrid.
  • Penetration testing ca be useful for determinig incident detection and response capabilities.
18
Q

Penetration testing Approches

A
  • Back Box (Blind)
  • Double Blind
  • Gray Box testing
  • White Box (Targeted)
19
Q

Back Box (Blind) Testing

A

Penetration testing team is not provided any details of the target environment.
Target personnel have knowledge of the test.

20
Q

Double Blind

A

Penetration testing team is not provided any details of the target environment.
Target personnel gave knowledge of the test.

21
Q

Gray Box Testing

A

Penetration testing team is provided limited information about the target environment .
Target personnel have knowledge of the test.

22
Q

White Box (Targeted)

A

Both the penetration testing team and target personnel are knowledgeable and work in concert.
More efficient testing method.
The final report may have impact.

23
Q

Penetration Test Phases

A
  • Passive Reconnaissance
  • Active Reconnaissance
  • Attack Planning
  • Attack and Exploitation
  • Reporting.
  • Remediation and Retesting
24
Q

Exploitation

A

Exploitation is the stage where the testers exploit target systems to compromise them. Depending upon the ROE, this pahse may be undertalen as “proof of concept” or actual exploit.
- Persistence is the act of installing or modifying services, installing malware or rootkits, creating backdoors, and/or creating accounts that will survive reboots.

25
Q

Exploitation

A

Exploitation is the stage where the testers exploit target systems to compromise them. depending upon the ROE, this phase may be undertaken as “proof of concept” or actual exploit.

26
Q

Persistance

A

Persistance is the act of installing modifying services, installing malware or rootkits, creating backdoors, and /or creating accounts that will survive reboots.

27
Q

Pivoting

A

Pivoting is the act of using a weakness on one system to access a better protected system.

28
Q

Escalation of Privilege

A

Escalation of Privilege is the act of exploting a vulnerability to gain elevated access to a resource.

29
Q

Reporting

A

Penetration test reports should include vulnerability findings, exploit activities, and recommendations for mitigation.

  • Vulnerability findings should be categorized and referenced appropriately with CVE notation.
  • Exploit activities should be documented with enough details so that they are reproducible.
  • Mitigation recommendations should be prioritized and as applicable, incliude risl reduction and security enhancement recommendations.
30
Q

Pen Test Result Evaluation

A
  • Scope: What Systems and devices are in scope?
  • Frequency: How often is the test conducted?
  • Stage: What is the stage of the target environment?
  • Type: Was the testing manual or automated?
  • Qualifications: What are the qualifications of the tester?
  • Rating Scale: What rating scale are they using - propietary, open source, government?
  • Results: How comprehensive are the results? Howclearly are they presented?
  • Remediation Plan: Are remediation actions documented? Is enough information presented so that the findings can be replicated?
31
Q

Red Team | Blue Team Simulation Exercises

A

Red Team | Blue Team Simulation Exercises are designated to simulate an attack and evaluate response and preparedness.

32
Q

Red Team

A

External entities that emaulate the behaviours and techniques of likely attackers.

33
Q

Blue Team

A

Internal security team (defenders)

34
Q

Purple Team

A

Independent third party the monitors both teams in real-time, evaluates inactivity, if applicable, facilitates communications, and recommends enhancements.

35
Q

Fagan Inspection

A
  • Planning
  • Overview
  • Preparation
  • Inspection
  • Rework
  • Follow-up