Domain 6 Flash Cards
Attack surface
Different security testing methods find different vulnerability types.
Artifact
piece of evidence such as text, or a reference to a resource which is submitted in response to a question
Assessment
testing or evaluation of controls to understand which are implemented correctly, operating as intended and producing the desired outcome in meeting the security or privacy requirements of a system or org
Audit
process of reviewing a system for compliance against a standard or baseline (e.g. audit of security controls, baselines, financial records) can be formal and independent, or informal/internal
Black box testing
Testing where no internal details of the system implementation are used.
Condition coverage
This criteria requires sufficient test cases for each condition in a program decision to take on all possible outcomes at least once. It differs from branch coverage only when multiple conditions must be evaluated to reach a decision.
Covert security testing
Performed to simulate the threats that are associated with external adversaries. While the security staff has no knowledge of the covert test, the organization management is fully aware and consents to the test
Chaos Engineering
discipline of experiments on a software system in production to build confidence in the system’s capabilities to withstand turbulent/unexpected conditions
Code testing suite
usually used to validate function, statement, branch and condition coverage
Compliance Calendar
tracks an org’s audits, assessments, required filings, due dates and related
Compliance Tests
an evaluation that determines if an org’s controls are being applied according to management policies and procedures
Data flow coverage
This criteria requires sufficient test cases for each feasible data flow to be executed at least once.
Decision (Branch) coverage
Considered to be a minimum level of coverage for most software products, but decision coverage alone is insufficient for high-integrity applications.
Dynamic testing
When the system under test is executed and its behavior is observed.
Ethical Penetration Testing/Penetration Testing
security testing and assessment where testers actively attempt to circumvent/defaut a system’s security features; typically constrained by contracts to stay within specified Rules of Engagement (RoE)
Examination
process of reviewing/inspecting/observing/studying/analyzing specs/mechanisms/activities to understand, clarify, or obtain evidence
Findings
results created by the application of an assessment procedure
Functional order of controls
deter, deny, detect, delay, deterimine, and decide
IAM system
identity and access management system combines lifecycle management and monitoring tools to ensure that identity and authorization are properly handled throughout an org
ITSM
IT Service Management tools include change management and associated approval tracking
Judgement Sampling
AKA purposive or authoritative sampling, a non-probability sampling technique where members are chosen only on the basis of the researcher’s knowledge and judgement
Loop coverage
This criteria requires sufficient test cases for all program loops to be executed for zero, one, two, and many iterations covering initialization, typical running, and termination (boundary) conditions.
Misuse case
A Use Case from the point of view of an Actor hostile to the system under design. Attempting to lead to integrity failures, malfunctions, or other security or safety compromises
Multi condition coverage
This criteria requires sufficient test cases to exercise all possible combinations of conditions in a program decision.