Section1 Flashcards

1
Q

Regulations

A

Legally binding mandates which demands strict adherence to data protection rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GDPR - general data protection regulation

A

Imposes strict rules on data processing and movement within the EU and for businesses or a company dealing with EU citizens data.

Fines up to 4% or 20 million euros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GLBA - Gramm-Leach-Bliley Act

A

Financial service act of 1999

Protect privacy of individuals, financial information held by financial institutions.

Includes encryption, security audits, sec measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HIPAA- health insurance portability and accountability act

A

Fiscal, admin, technical safeguards.

Regulates confidentiality, and security of healthcare information

Encryption, secure access controls and reg audits

Fines: 100$ -50k. Max pen 1.5m per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PCI DSS - payment card, industry, data security standard

A

For credit cards/payments

Secure networks, implementing strong, access control, conducting regular network, monitoring, and testing

5k - 100k per month until fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISO / IEC 27000 series

A

Specifications for implementing maintaining and improving IT security management systems

Mitigate legal risks, build customer trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stakeholder alignment

A

Ensures that everyone understands the objectives, timelines and outcomes of a pen test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of Assessments

A

Network
Wireless
Application
Mobile
Web
Cloud
API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network assessment

A

Network topology
Firewall configs
Security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wireless assessments

A

Simulate attacks on wireless networks to understand security issues and provide recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

App assessments

A

Code audits
Old Dependency audits
App configs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile assessments

A

Check data leaks
Improper session handling
Insecure data storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web assessments

A

Look for SQL injection, cross, side, scription, security misconfiguration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud assessments

A

Check cloud configurations and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

API assessments

A

Check authentication, authorization, data handling practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of agreements

A

NDA
MSI master service agreements
SOW statements of work
TOS terms of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MSA master serv agreement

A

Project scope
Payment details
Confidentiality clauses
Liability issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Statement of work SOW

A

Outline objectives, deliverables, scope of work, timelines, payment schedules, and responsibilities of each party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Legal and ethical considerations overview

A

Authorization letters
Mandatory reporting requirements
Potentials risks to pentester
Establish escalation path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authorization letter

A

Formally grant’s permissions to pentester to conduct a simulated cyber attack against organizations systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Mandatory reporting

A

Dictate how and when findings should be disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Risks to tester

A

1.Conduct thorough risk assessment
2.implement precautionary measures to protect system
3.establish mutual understanding with client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Escalation path

A

Outline chain of command.

Mitigates: operation interference, system, interference, accidental breach of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Rules of engagement overview

A

Exclusions
Test cases
Test window
Goal reprioritization
Business impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Exclusions

A

Specifically designated areas out of scope and off-limits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Test cases

A

Predefined scenarios to evaluate the security of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Test window

A

Time frame to run test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Goal reprioritization

A

Change goals based on findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

IP address

A

Nodes within network or on internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Shared responsibility model

A

Laid out different rules and responsibilities of stakeholders involved in keeping a hosted environment secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Building model actors

A

Hosting providers
customers
penetration testers
third party service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Hosting providers

A

Secure infrastructure that runs services offered to customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Target selection 4.

A

CIDR ranges
Domains
IPs
URLs

35
Q

CIDR - classless inter-domain Routing

A

Method used to allocate IP addresses and route Internet

36
Q

Cloud security out of the box from cloud providers

A

AWS - AWS trusted advisor and AWS inspector
Azure - azure security center and azure advisor
GCP - cloud security command center and cloud Armo

37
Q

Before cloud pen testing

A

Notify service provider

38
Q

3rd party shared responsibility

A

Software vendors
External consultants
Partners

39
Q

MITRE ATTACK framework - adversarial tactics techniques

Who funds?

A

Funded by the US computer, emergency readiness team, and the US Department of Homeland security.

40
Q

MITRE tailored models

A

Enterprise
Mobile
Cloud
And different operating systems

41
Q

MITRE categories

A

Initial access
execution,
persistence,
privilege escalation,
defense, evasion

42
Q

Mitre - initial access category

A

Spear phishing
Drive by compromise

43
Q

Spearphishing

A

Targeted emails with malicious attachment

45
Q

CIDR block for 192.168.100.0/24

A

192.168.100.1 - 192.168.100.254

46
Q

Domains

A

Human readable addresses

48
Q

OWASP ACRONYM

A

Open Web application security project

49
Q

OWASP general info

A

Non profit

OWASP top 10 - 10 most common vulns

50
Q

OWASP top ten

A

Broken access control
Cryptographic failures
Injections
Insecure design
Sec misconfigurations
Outdated components/packages
Auth failure
Data integrity failure
Logging failures
SSRF - server-side request forgery

51
Q

Broken access control

A

Users can access what they shouldn’t be able to

52
Q

Cryptographic failures

A

Failures related to managing sensitive data securely

53
Q

Injection flaws

A

SQL, no SQL, command injection

54
Q

MASVS acronym

A

Mobile application, security verification standard

55
Q

MASVS control groups

A

MASVS-XXXXX

56
Q

MASVS-STORAGE

A

Focus on secure storage of sensitive data

57
Q

MASVS-CRYPTO

A

Cryptographic measures

58
Q

MASVS-AUTH

A

Ensure strong mechanism to verify user identities and grant appropriate access rate rates

59
Q

MASVS-NETWORK

A

Security of communication between mobile app and endpoints such as TLS/SSL

60
Q

MASVS-PLATFORM

A

Focus on how securely app interacts with underlying mobile platform and other apps on same device

61
Q

MASVS-CODE

A

Secured development of apps code

62
Q

MASVS-RESILIENCE

A

Ability to withstand and respond to reverse engineering and tampering

63
Q

MASVS-PRIVACY

A

Implements privacy controls that align with laws and regulations

64
Q

MASVS checklist OWASP

A

Mobile application, security testing guide (MASTG)

MAS Checklist

65
Q

PTES acronym

A

Penetration testing execution standard

66
Q

PTES - general info

A

Framework to conduct thorough and effective penetration tests

67
Q

PTES - pre-engagement interactions

A

First communication and the reason for conducting a penetration test.

Time estimation, scoping, additional support, questionnaires, scope, creep, start and end dates, IP ranges and domains, dealing with third parties, acceptable, social engineering, goals, lines of communication, emergency, contact information, rules of engagement, technology in place

69
Q

PTES - Information gathering 3

A

Compliance driven
best practice
state sponsored

Open source intelligence
Footprinting - maps network env

71
Q

PTES - threat modeling

A

Understanding business assets and processes that need protection and the threats and they’re capabilities

73
Q

CREST defensible penetration test guidelines CDPT - general

A

Established a standard for conducting penetration tests with a clear structured approach

74
Q

Council of registered ethical security testers (CREST)

A

An organization of security companies that sets rigorous standards for cyber security services

75
Q

How many companies in CREST

76
Q

How to become crest certified?

A

Extensive audit and accreditation process

77
Q

CREST purpose

A

Find highly qualified individuals and companies for penetration testing