Domain 6: Security Assessment and Testing Flashcards

1
Q

Define security testing

A

Verifies that a control is functioning properly. These tests include automated scans, tool-assisted penetration tests and manual attempts to undermine security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Verification

A

Objective evidence that the design outputs of a phase of the SDLC meet requirements. This may be performed by a third party entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Validation

A

Develop a “level of confidence” that the software meets all requirements and expectations, software improve over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network flow - Logging

A

Captured to provide insight into network traffic for security, troubleshooting, and performance management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Audit logging (network)

A

Provides information about events that have occurred, on routers/other network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NTP

A

Network Time Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is accurate time important for an environment?

A

Logs must have accurate time stamps that these time stamps remain consistent throughout the environment. A common method is to set up an internal NTP server that is synchronised to a trusted time source such as a public NTP server. Other systems can then sychronise with this internal NTP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Syslog

A

Message logging standard commonly used by network devices, Linux and Unix systems and other devices (firewalls).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Modified logs are a sign of…

A

Intrusion or malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

War driving

A

Driving a car with a laptop to find open AP’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDS

A

Intrusion Detection Systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two types of IDS

A
  1. Network Based

2. Host Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Based IDS

A

Detects intrusions on the LAN behind a firewall. It is a passive device while it acquires data and reviews packets and headers. However, the issue with NIDS is that it will not detect attacks by users logged into hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Host based IDS

A

Monitors servers through Event and System logs. However, it is only as good as the host logging created. However, it can be easier to discover and disable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Signature based method (AKA Knowledge based)

A

Attacks are compared with signature attack database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Statistical anomaly based

A

Defines a normal behavior and detects abnormal behaviors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Response Box

A

Is a part of an IDS that initiates an alarm or activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Response Box Components

A

Information source/sensor, centralised monitor software, data and event report analysis, database components and response to an event or intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IPS Intrusion Prevention System

A

Detect attack and PREVENT that attack from being successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Remote Acces Software

A

Granted and secured through VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Web Proxies

A

Form of gateway that provides clients with a filtering, caching, or other service that protects their information from remote systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Vulnerability Management System

A

Such as Nessus, used to enable effective patch management strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Authentication Servers

A

System that facilitates authentication of an entity, such as SSO servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Routers

A

Opens up data packet, reads hardware or network address and then forwards it to the correct network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Firewalls

A

Network device to analyse the network traffic entering and leaving a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Clipping Level

A

Where companies can set predefined thresholds for the number of certain types of errors that will be allowed before the activity is considered suspicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Audit Trails

A

A history of audit log events that may include transaction date/time, who processed the transaction, and at which terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Breaches

A

Incident that results in disclosure or potential disclosure of data. It is about breaking the confidentiality of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Availability of logs

A

Archival process to prevent loss by overwritten logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Log analysis

A

Study logs for events of interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Log size

A

Set maximum size. If too small, attackers can make little changes and push them out of window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Real User Monitoring

A

Aims to capture and analyse every transaction of a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Synthetic Performance Monitoring

A

Uses scripted or recorded data. Proactive monitoring involves having external agents run scripted transactions against a web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Code Review

A

Foundation of software assessment programs. Other developers review code for defects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Fagan Inspections

A

Most formal code review process, which follows a rigorous review and testing process with six steps:

  1. Planning
  2. Overview
  3. Preparation
  4. Inspection
  5. Rework
  6. Follow-up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Code Coverage Report

A

Information on the functions, statements, branches and conditions covered in testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Use cases - test coverage

A

Used as part of test coverage calculation that divides the tested use case by total use cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Code Review Report

A

Generated if the organisation was manually reviewing the application’s source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Black box testing

A

Observes the system’s external behavior, no internal detains known

40
Q

Dynamic Testing

A

Does not require access to source code, evaluates code in a runtime environment

41
Q

White box Testing

A

Detailed examination of a logical path, checking the possible conditions. Requires access to source code

42
Q

Static Testing

A

Requires access to source code, performs code analysis

43
Q

CVE

A

Common Vulnerability and Exposures Dictionary. The CVE dictionary provides a standard convention used to identify vulnerabilities, produced by MITRE.

44
Q

CVSS

A

Common Vulnerability Scoring System, metrics and calculation tools for exploitability, impact, how mature exploit code is, and how vulnerabilities can be remediated, also to score vulnerabilities against unique requirements.

45
Q

NVD

A

National Vulnerability DB

46
Q

Compiled Code

A

Poses more risk than interpreted code because malicious code can be embedded in the compiled code and can be difficult to detect

47
Q

Regression Testing

A

Is the verification that what is being installed does not affect any portion of the application system already installed. It generally requires the support of automated process to repeat tests previously undertaken. Known inputs against an application then compares results to earlier version results

48
Q

Non Regression Testing

A

Code works as planned

49
Q

Code comparison

A

Normally used to identify the parts of the source code that have changed

50
Q

Integration Testing

A

Aimed at finding bugs in the relationship and interfaces between pairs of components. It does not normally test all functions

51
Q

Attack surface

A

Exposure

52
Q

STRIDE: Threat Modelling

A

Is often used in relation to assessing threats against applications, or OS’s, threat categorisation scheme, spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege

53
Q

Spoofing

A

An attack with the goal of gaining access to a target system through the use of falsified identity. Spoofing can be used against IP addresses, MAC address, usernames, system names, wireless network SSIDs, and other types of logical identification.

54
Q

Tampering

A

Any action resulting in the unauthorised changes or manipulation of data, whether in transit or in storage. Tampering is used to falsify communications or alter static information. Such attacks are a violation of integrity as well as availability.

55
Q

Repudiation

A

The ability for a user or attacker to deny having performed an activity

56
Q

Information disclosure

A

The revelation or distribution of private, confidential, or controlled information to external or unauthorised entities.

57
Q

Elevation of privilege

A

An attack where a limited user account is transformed into an account with greater privileges/powers/access.

58
Q

Examples of Security KPI’s

A

Number of open vulnerabilities, time to resolve vulnerabilities, number of compromised accounts, number of software flaws detected in pre-production scanning and repeat audit findings, and user attempts to visit known malicious sites.

59
Q

Vulnerability scans

A

Automatically probe systems, applications, and networks, looking for weaknesses that may be exploited

60
Q

Network discovery scanning

A

Uses a variety of techniques to scan a range of IP addresses, searching for systems with open ports.

61
Q

TCP SYN Scanning

A

Sends a single packet to each scanned port with the SYN flag set. This indicates a request to open a new connection. If the scanner receives a response that has the SYN and ACK flags set, this indicates that the system is moving to the second phase in the three-way TCP handshake and that the port is open. TCP SYN scanning is also known as “half-open” scanning.

62
Q

TCP Connect Scanning

A

Opens a full connection to the remote system on the specified port. This scan type is used when the user running the scan does not have the necessary permissions to run a half-open scan.

63
Q

TCP ACK Scanning

A

Sends a packet with the ACK flag set, indicating that it is part of an open connection

64
Q

Xmas Scanning

A

Sends a packet with the FIN, PSH, and URG flags set. Its like a christmas tree

65
Q

Passive Scanning

A

User scans wireless to look for rogue devices in addition to IDS

66
Q

Authenticated Scans

A

Read-only account to access config files

67
Q

Static Testing

A

Evaluates the security of software without running it by analysing either the source code or the compiled application. Static analysis usually involves the use of automated tools designed to detect common software flaws, such as buffer overflows.

68
Q

Dynamic Testing

A

Evaluates the security of software in a runtime environment and is often the only option for organisations deploying applications written by someone else. In those cases, testers often do not have access to the underlying source code. One common example of dynamic software testing is the use of web application scanning tools to detect the presence of issues.

69
Q

Fuzz Testing

A

Specialised dynamic testing technique that provides many different types of inputs to stress its limits and find previously undetected flaws. Fuzz testing software supplies invalid input to the software, either randomly generated or specially crafted to trigger known software vulnerabilities.

70
Q

Mutation (Dumb) Fuzzing

A

Takes previous input values from actual operation of the software and manipulates (or mutates) it to create fuzzed input. For example, it might alter the characters of the content, append strings to the end of the content, or perform other data manipulation techniques.

71
Q

Generational (Intelligent) Fuzzing

A

Develops inputs based on models of expected inputs to perform the same task. The zzuf tool automates the process of mutation fuzzing by manipulating input according to user specifications.

72
Q

Misuse Case Testing

A

Software testers use this process or abuse case testing to evaluate the vulnerability of their software to known risks.

73
Q

Test Coverage Analysis

A

Method used to assess how well software testing covered the potential use of an application

74
Q

Interface Testing

A

Interface testing includes the hand-offs between separately developed modules. Interface testing assesses the performance of modules against the interface specifications to ensure that they will work together properly when all of the development efforts are complete.

75
Q

Types of Interface Testing

A
  1. API Testing
  2. UI Testing
  3. Physical Interfaces
76
Q

API Testing

A

Testing of APIs to ensure that they enforce all security requirements.

77
Q

UI Testing

A

Review GUI to verify that they function properly

78
Q

Physical Interfaces

A

Exist in some applications that manipulate machinery, logic controllers, or other objects in the physical world.

79
Q

Unit Testing

A

Testing small pieces of software during a development stage by developers and QA. This ensures that quality units are furnished for integration into final product

80
Q

Integration Level Testing

A

Focus on transfer of data and control across a programs interfaces.

81
Q

System level testing

A

Demonstrates that all specified functionality exists and that the software product is trustworthy.

82
Q

SOC Reports

A

Service organisation control report.

83
Q

SOC 1 Report

A

Covers only internal controls over financial reporting.

84
Q

SOC 2 Report

A

Design and OE. This verifies the security, integrity, privacy and availability controls, in detail for business partners and auditors.

85
Q

SOC 3 Report

A

Shared with broader community, website seal. Supports organisations claims about their ability to provide CIA.
Type 1: Is a Point in Time covering design
Type 2: Period of time covering design and OE.

86
Q

Log Management System

A

Volume of log data, network bandwidth, security of data, and amount of effort to analyse. Not enough log sources

87
Q

OPSEC process

A

Understanding your day to day operations from the viewpoint of a competitor, enemy, or hacker and then developing and applying countermeasures.

88
Q

Penetration Teting

A

Testing of network security as would a hacker do to find vulnerabilities. Always get management approval first.

89
Q

Port Scanner

A

Program that attempts to determine whether any of a range of ports is open on a particular device.

90
Q

Ring Zero

A

Inner code of the OS. Reserved for privileged instructions by the OS itself

91
Q

War dialer

A

Dials a range of phone numbers as in the movie Wargames

92
Q

Superzapping

A

System utility or application that bypasses all access controls and audit/logging functions to make updates to code or data

93
Q

Operational assurance

A

Verification that a system is operating according to its security requirements. This includes:

  • Design and development reviews
  • Formal modeling
  • Security architecture
  • ISO 9000 quality techniques
94
Q

Piggybacking

A

When an unauthorised person goes through a door behind an authorised person

95
Q

Tailgating

A

Authorised person circumventing controls

96
Q

Supervisor mode

A

Processes running in inner protected ring