Section 1: Planning an Engagement Flashcards
Vulnerability vs Risk vs Threat
Risk Handling Strategies
Risk Avoidance
Risk Transfer
Risk Mitigation
Risk Acceptance
Risk Appetite vs Risk Tolerance
Risk Appetite - Overall generic level of risk the organization is willing to accept
Risk Tolerance - Specific maximum risk the organization is willing to takeabout a specific identified risk
Access Control Types
Compensative - used in place of primary control
Corrective - reduces the effect (fire extinguishers)
Detective
Deterrent - discourages violation of security policies (security camera)
Directive - Acceptable Use Policy
Preventitive
Recovery
Statement of Work
A formal document that details the tasks to be performed during an engagement
▪ The statement of work will usually contain the list of deliverables
● Final report
● Responsibilities of the penetration tester and the client
● Schedule
● Timelines for payments
Master Service Agreement (MSA)
A specialized type of contract that is used to govern future transactions and agreements
Used if you do a lot of work for the same client repeatedly.
Sarbanes-Oxley (SOX)
Affects publicly traded U.S. corporations
Gramm-Leach-Bliley Act of 1999 (GLBA)
Affects banks, mortgage companies, loan offices, insurance companies, investment companies, and credit card providers
Federal Information Security Management Act of 2002 (FISMA)
Affects federal agencies
Family Educational Rights and Privacy Act (FERPA)
Protects the privacy of student education records