Implementing Vulnerability Scanning Methods Flashcards
International Organization for Standardization(ISO)
Develops many standards and frameworks governing the use of computers, networks, and telecommunications, including ones for information security (27K series) and risk management (31K series).
Open Web Application Security Project(OWASP)
A charity and community publishing a number of secure application development resources.
Center of Internet Security(CIS)
A not-for-profit organization (founded partly by SANS). It publishes the well-known “Top 20 Critical Security Controls” (or system design recommendations).
Payment Card Industry Data Security Standard(PCI DSS)
Information security standard for organizations that process credit or bank card payments.
CIS Benchmarks
These best practices are maintained by a group of public and private sector security experts working with organizations to improve their information systems security.
Vulnerability Scanner
Hardware or software configured with a list of known weaknesses and exploits and can scan for their presence in a host OS or particular application.
Fingerprinting
Identifying the type and version of an operating system (or server application) by analyzing its responses to network scans.
Static Analysis
The process of reviewing uncompiled source code either manually or using automated tools.
Dynamic Analysis
Software testing that examines code behavior during runtime. It helps identify potential security issues, potential performance issues, and other problems.
Fuzzing
A dynamic code analysis technique that involves sending a running application random and unusual input so as to evaluate how the app responds.
Reverse Engineering
The process of analyzing the structure of hardware or software to reveal more about how it functions.
Configuration Baseline
details the recommended settings for services and policy configuration for a device or software operating in a specific role.
Operational Technology(OT)
Communications network designed to implement an industrial control system rather than data networking.
Industrial Control Systems(ICSs)
Network managing embedded devices (computer systems that are designed to perform a specific, dedicated function).
Human-Machine Interfaces(HMIs)
Input and output controls on a PLC to allow a user to configure and monitor the system.