Section 22 Vulnerability Management Flashcards
Seeks to identify any issue in a network, application, database, or other systems prior to it being used that might compromise the system.
Vulnerability Assessment
Practice of finding and mitigating the vulnerabilities in computers and networks.
Vulnerability Management
Occurs when an attacker moves onto another workstation or user account.
Pivot
Ability of an attacker to maintain a foothold inside the compromised network.
Persistence
Exercise that uses an incident scenario against a framework of controls or a red team.
Tabletop Exercise (TTX)
A test that uses active tools and security utilities to evaluate security by simulating an attack on a system to verify that a threat exists, actively test it, bypass security controls, and then finally exploit vulnerabilities on a given system.
Penetration Test
The hostile or attacking team in penetration test or incident response exercise.
Red Team
The defensive team in a penetration test or incient response exercise.
Blue Team
Staff administering, evaluating, and supervising a penetration test or incident response exercise.
White Team
A standard designed to regulate the transfer of secure public information across networks and the internet utilizing any security tools and services available.
Open Vulnerability and Assessment Language (OVAL)
An XML schema used to define and describe the information being created by OVAL to be shared among the various programs and tools.
OVAL Language
A reference developed to ensure the information passed around by these programs complies with the OVAL schemes and definitions used by the OVAL language.
OVAL Interpreter
Discovery and documentation of physical and logical connectivity that exists in the network.
Network Mapping
A technique that identifies threats on the network without exploiting them.
Vulnerability Scanning
A technique used to gain information about servers and inventory the systems or services.
Banner Grabbing