Domain 6 - Security Assessment and Testing Flashcards
1
Q
Sec assessment and testing programs
A
mechanism for validating ongoing effectiveness of sec controls, with a variety of tools to validate controls ie vuln assessments, pentests, software testing, audits, sec management tasks, every org should have a sec assessment and testing program defined and operational
2
Q
Vulnerability assessments
A
- use automated tools to search for known vulnerabilities in systems/ apps/ networks, flaws may include missing patches, misconfigurations, or faulty code, will often call out the CVE
3
Q
Penetration tests
A
- assessor attempts to exploit vulnerabilities and gain access to the system, done by external companies
4
Q
Pentest strategies
A
- war dialing (bank of modems, legacy), sniffing (monitor the network), eavesdropping (listening), dumpster diving, social engineering (human manipulation), tests that involve human interaction and analysis will increase cost but are more thorough
5
Q
Security process data
A
- employment policies and practices (term process and background checks), roles and responsibilities (management sets standard and verbalizes policy), security awareness training (prevents social engineering, helps with phishing), WRITE COMMUNICATE TRAIN
6
Q
Software testing
A
- validate code before moving to production, verifies it functions as designed and doesn’t contain security flaws, test APIs, UIs, and Physical interfaces
7
Q
Code review
A
- peer review process to validate code before deploying to production
8
Q
Interface testing
A
- assesses interactions between components and users with API testing, user interface testing, and physical interface testing, how an interface interacts with a database or an API, can be automated, sometimes user experience testing
9
Q
Static software testing
A
- evaluate security of software without running it. Code review. Analyzing source code or the compiled application
10
Q
Dynamic software testing
A
- evaluate sec of software in a runtime environment, often the option for orgs deploying apps written by someone else
11
Q
Fuzzing
A
- uses modified inputs to test software under unexpected circumstances, ie changing input around to see how the application responds, can flush out things like SQL injection vulns, modifies known inputs to generate synthetic inputs that may trigger unexpected behavior, generational fuzzing develops inputs BASED ON models of expected inputs to perform the same task
12
Q
Log reviews
A
- particularly for admin/ privileged activities, ensures that systems are not misused
13
Q
Account management reviews
A
- ensure that only authorized users retain access to information systems, typically uses a RANDOM SAMPLING of accounts
14
Q
Backup verification
A
- ensures that the organizations data protection process is functioning properly, VERY IMPORTANT
15
Q
Key performance and risk indicators
A
- high level review of sec program EFFECTIVENESS, evolving sec controls over time