Domain 6: Security Assessment and Testing Flashcards
Define security testing
Verifies that a control is functioning properly. These tests include automated scans, tool-assisted penetration tests and manual attempts to undermine security.
Verification
Objective evidence that the design outputs of a phase of the SDLC meet requirements. This may be performed by a third party entity.
Validation
Develop a “level of confidence” that the software meets all requirements and expectations, software improve over time.
Network flow - Logging
Captured to provide insight into network traffic for security, troubleshooting, and performance management.
Audit logging (network)
Provides information about events that have occurred, on routers/other network devices.
NTP
Network Time Protocol.
Why is accurate time important for an environment?
Logs must have accurate time stamps that these time stamps remain consistent throughout the environment. A common method is to set up an internal NTP server that is synchronised to a trusted time source such as a public NTP server. Other systems can then sychronise with this internal NTP server.
Syslog
Message logging standard commonly used by network devices, Linux and Unix systems and other devices (firewalls).
Modified logs are a sign of…
Intrusion or malicious intent.
War driving
Driving a car with a laptop to find open AP’s
IDS
Intrusion Detection Systems.
What are the two types of IDS
- Network Based
2. Host Based
Network Based IDS
Detects intrusions on the LAN behind a firewall. It is a passive device while it acquires data and reviews packets and headers. However, the issue with NIDS is that it will not detect attacks by users logged into hosts.
Host based IDS
Monitors servers through Event and System logs. However, it is only as good as the host logging created. However, it can be easier to discover and disable.
Signature based method (AKA Knowledge based)
Attacks are compared with signature attack database
Statistical anomaly based
Defines a normal behavior and detects abnormal behaviors
Response Box
Is a part of an IDS that initiates an alarm or activity
Response Box Components
Information source/sensor, centralised monitor software, data and event report analysis, database components and response to an event or intrusion
IPS Intrusion Prevention System
Detect attack and PREVENT that attack from being successful
Remote Acces Software
Granted and secured through VPNs
Web Proxies
Form of gateway that provides clients with a filtering, caching, or other service that protects their information from remote systems.
Vulnerability Management System
Such as Nessus, used to enable effective patch management strategy
Authentication Servers
System that facilitates authentication of an entity, such as SSO servers
Routers
Opens up data packet, reads hardware or network address and then forwards it to the correct network.
Firewalls
Network device to analyse the network traffic entering and leaving a network.
Clipping Level
Where companies can set predefined thresholds for the number of certain types of errors that will be allowed before the activity is considered suspicious
Audit Trails
A history of audit log events that may include transaction date/time, who processed the transaction, and at which terminal
Breaches
Incident that results in disclosure or potential disclosure of data. It is about breaking the confidentiality of data.
Availability of logs
Archival process to prevent loss by overwritten logs
Log analysis
Study logs for events of interest.
Log size
Set maximum size. If too small, attackers can make little changes and push them out of window
Real User Monitoring
Aims to capture and analyse every transaction of a user
Synthetic Performance Monitoring
Uses scripted or recorded data. Proactive monitoring involves having external agents run scripted transactions against a web application.
Code Review
Foundation of software assessment programs. Other developers review code for defects.
Fagan Inspections
Most formal code review process, which follows a rigorous review and testing process with six steps:
- Planning
- Overview
- Preparation
- Inspection
- Rework
- Follow-up
Code Coverage Report
Information on the functions, statements, branches and conditions covered in testing.
Use cases - test coverage
Used as part of test coverage calculation that divides the tested use case by total use cases.
Code Review Report
Generated if the organisation was manually reviewing the application’s source code