Domain 6 Flashcards

1
Q

NIST 800-53A

A

NIST best practices for conducting security & privacy assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security assessment and testing programs

A

Every organization should have a security assessment and testing program defined and operational.

provides a mechanism for validating the ongoing effectiveness of security controls, with a variety of tools to validate controls:

  • vulnerability assessments
  • penetration tests, software testing
  • audits
  • security management tasks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerability Assessments

A

use automated tools to search for known vulnerabilities in systems, applications, and networks.

flaws may include missing patches, misconfigurations, or faulty code that expose the organization to security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Penetration tests

A

uses these same tools but supplements them with attack techniques where an assessor attempts to exploit vulnerabilities
and gain access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Penetration test strategies

A
  • War Dialing – Bank of Modems
  • Sniffing – Monitor the Network
  • Eavesdropping – Listening
  • Dumpster Diving – Just like it sounds
  • Social Engineering – Human Manipulation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Employment Policies and Practices

A

Termination process and background checks

write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Roles and Responsibilities

A

Management sets the standard and verbalizes the policy

communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Awareness Training

A

Prevents Social Engineering, helps with phishing

train

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software testing

A

techniques verify that code functions as designed and does not contain security flaws. (static and dynamic)

Perform software testing to validate code moving into production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Code review

A

uses a peer review process to formally or informally validate code before deploying it in production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Interface testing

A

assesses the interactions between components and users with API testing, user interface testing, and physical interface testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Static Software testing

A

techniques include code reviews, evaluate the security of software without
running it by analyzing either the source code or the compiled application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dynamic Software testing

A

evaluates the security of software in a runtime environment and is often the only option for organizations deploying applications written by someone else. (written by someone else is not a requirement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fuzzing (testing technique)

A

Uses modified inputs to test software
performance under unexpected circumstances

Modifies known inputs to generate synthetic inputs that may trigger unexpected behavior

Generational fuzzing develops inputs based on models of expected inputs to perform same task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Log Reviews

A

particularly for administrator activities, ensure that systems are not misused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Account Management Reviews

A

ensure that only authorized users retain access to information systems.

17
Q

Backup Verification

A

ensures that the organization’s data protection process is functioning properly

18
Q

Key Performance and Risk Indicators

A

provide a high level view of security program effectiveness.

19
Q

Security Audits

A

occur when a third party performs an assessment of the security controls protecting an organization’s information assets.

20
Q

Internal Audits

A

are performed by an organization’s internal staff and are intended for
management use.

External audits are performed by a third
party audit firm and are generally intended for the organization’s governing body.

Assume audit is 3rd party unless question says otherwise

21
Q

Four Components of NIST 800-53A

A

Specifications - documents associated with the system being audited.

Activities - actions carried out by people
within an information system.

Mechanisms - controls used within an
information system to meet the specifications.

Individuals - people who implement specifications, mechanisms, and activities