Domain 6: Security Assessment and Testing Flashcards
Audit
An audit is a systematic assessment of the security controls of an information system.
What is the most important step in planning a security audit?
Setting a clear set of goals
Pros and cons of internal audits
Internal audits benefit from the auditors’ familiarity with the systems.
They may be hindered by a lack of exposure to how others attack and defend systems.
External audits
External audits happen when organizations have a contract in place that includes security provisions.
The contracting party can demand to audit the contractor to ensure those provisions are being met.
Pros and cons of third-party audits
Third-party audits typically bring a much broader background of experience that can provide fresh insights.
They can be expensive.
Test coverage
Test coverage is a measure of how much of a system is examined by a specific test (or group of tests).
Vulnerability test
A vulnerability test is an examination of a system for the purpose of identifying defining and ranking its vulnerabilities.
Black box testing
Black box testing treats the system being tested as completely opaque.
White box testing
White box testing affords the auditor complete knowledge of the inner workings of the system even before the first scan is performed.
Gray box testing
Gray box testing gives the auditor some but not all information about the internal workings of the system.
Penetration testing
Penetration testing is the process of simulating attacks on a network and its systems at the request of the owner.
Blind test
A blind test is one in which the assessors only have publicly available data to work with and the network security staff is aware that the testing will occur.
Double-blind test
A double-blind test (stealth assessment) is a blind test in which the network security staff is not notified that testing will occur.
War dialing
War dialing allows attackers and administrators to dial large blocks of phone numbers in search of available modems.
Log review
A log review is the examination of system log files to detect security events or to verify the effectiveness of security controls.
Synthetic transactions
Synthetic transactions are scripted events that mimic the behaviors of real users and allow security professionals to systematically test the performance of critical services.
Misuse case
A misuse case is a use case that includes threat actors and the tasks they want to perform on the system.