Domain 6 Flash Cards
Attack surface
Different security testing methods find different vulnerability types.
Artifact
piece of evidence such as text, or a reference to a resource which is submitted in response to a question
Assessment
testing or evaluation of controls to understand which are implemented correctly, operating as intended and producing the desired outcome in meeting the security or privacy requirements of a system or org
Audit
process of reviewing a system for compliance against a standard or baseline (e.g. audit of security controls, baselines, financial records) can be formal and independent, or informal/internal
Black box testing
Testing where no internal details of the system implementation are used.
Condition coverage
This criteria requires sufficient test cases for each condition in a program decision to take on all possible outcomes at least once. It differs from branch coverage only when multiple conditions must be evaluated to reach a decision.
Covert security testing
Performed to simulate the threats that are associated with external adversaries. While the security staff has no knowledge of the covert test, the organization management is fully aware and consents to the test
Chaos Engineering
discipline of experiments on a software system in production to build confidence in the system’s capabilities to withstand turbulent/unexpected conditions
Code testing suite
usually used to validate function, statement, branch and condition coverage
Compliance Calendar
tracks an org’s audits, assessments, required filings, due dates and related
Compliance Tests
an evaluation that determines if an org’s controls are being applied according to management policies and procedures
Data flow coverage
This criteria requires sufficient test cases for each feasible data flow to be executed at least once.
Decision (Branch) coverage
Considered to be a minimum level of coverage for most software products, but decision coverage alone is insufficient for high-integrity applications.
Dynamic testing
When the system under test is executed and its behavior is observed.
Ethical Penetration Testing/Penetration Testing
security testing and assessment where testers actively attempt to circumvent/defaut a system’s security features; typically constrained by contracts to stay within specified Rules of Engagement (RoE)
Examination
process of reviewing/inspecting/observing/studying/analyzing specs/mechanisms/activities to understand, clarify, or obtain evidence