Domain 6 - Security Assessment and Testing Flashcards
Security Review
Conducted by system maintenance or security personnel
Goal is determine vulnerabilities within a system. Also known as a vulnerability assessment
Security Audit
Conducted by 3rd party
Determines the degree to which required controls are implemented
Penetration Testing
Ethical hacking to validate discovered weaknesses Red Teams (Attack)/Blue Teams (Defend)
NIST SP 800-42
National Institute of Standards and Technology
Guideline on Security Testing
Zero Knowledge
Team has no knowledge of the target and must start with only information that is publically available. This simulates an external attack
Partial Knowledge
The team has limited knowledge of the organization
Full Knowledge
This simulates an internal attack. The team has full knowledge of network operations
Blind
The assessors have only publicly available knowledge. The network teams knows that testing is taking place
Double Blind
The assessors have only publicly available knowledge, but in this instance the network teams do NOT know the test is taking place. This will allow evaluation of incident response
Targeted Testing
External consultants work with internal staff to focus on specific systems or applications
OSI Model
Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application
HTTP
HHTPS
80
443
FTP
20/21
File Transfer Protocol
RDP
3389
Remote Desktop Protocol
DNS
53
Domain Name System
FTPS
989/990
Secure File Transfer Protocol
TFTP
69
Trivial File Transfer Protocol
DHCP
67/68
Dynamic Host Configuration Protocol
ARP
RARP
Address Resolution Protocol
Reverse Address Resolution Protocol
Ethernet standard
802.3
CSMA/CD Carrier Sense Multiple Access w/ Collison Detection
Wireless Standard
802.11
CSMA/CA Carrier Sense Multiple Access w/ Collison Avoidance