Security of Networks, Systems, Applications and Data Flashcards
While every risk assessment methodology has different nuances and approaches, most have three common inputs:
asset identification,
threat assessment and
vulnerability assessment.
Risk analyses can be oriented toward one of the inputs, making the risk assessment:
asset-oriented,
threat-oriented or
vulnerability-oriented.
For risk that has inadequate or no controls, there are many options to address each risk:
Risk Reduction
Risk Avoidance
Risk Transfer or Sharing
Risk Acceptance
Four common types of vulnerabilities:
- Technical - Errors in design, implementation, or configuration
- Process - Errors in operation
- Organizational - Errors in management, decision, planning or from ignorance
- Emergent - Interactions between, or changes in, environments
Penetration testing includes identifying existing vulnerabilities and then using common exploit methods to:
- Confirm exposures
- Assess the level of effectiveness and quality of existing security controls
- Identify how specific vulnerabilities expose IT resources and assets
- Ensure compliance
Several considerations are important prior to any penetration testing:
- Clearly define the scope of the test
- Gather explicit, written permission
- Ensure testers implement “Do no harm” procedures
- Put in place communication and escalation plans
Penetration testing can be divided into four main phases:
- Planning
- Discovery
- Attack
- Reporting
Techniques used to gather information during the Discovery phase of penetration testing include:
a. DNS interrogation, WHOIS queries and network sniffing to discover host name and IP address information
b. Search web servers and directory servers for employee names and contact information
c. Banner grabbing for application and service information
d. NetBIOS enumeration for system information
e. Dumpster diving and physical walk-throughs of the facilities to gather additional information
f. Social engineering, such as posing as a help desk agent and asking for passwords, posing as a user and calling the help desk to reset passwords or sending phishing emails
And includes a vulnerability assessment.
The ______ phase (of penetration testing) is the process of verifying previously identified vulnerabilities by attempting to exploit them. Metasploit® hosts a public database of quality-assured exploits. They rank exploits for safe testing.
attack
Metasploit’s most popular payload is called _______, which enables a user to upload and download files from the system, take screenshots and collect password hashes.
Meterpreter
The ______ phase (of penetration testing) is the process of verifying previously identified vulnerabilities by attempting to exploit them. Metasploit® hosts a public database of quality-assured exploits. They rank exploits for safe testing.
attack
The ________ phase (of penetration testing) occurs simultaneously with the other phases. An assessment plan is developed during the planning phase. Logs are kept during the discovery and attack phases.
reporting
Network management is the process of assessing, monitoring, and maintaining network devices and connections. The International Organization for Standardization (ISO) network management model defines five functional areas of network management (FCAPS):
- Fault Management—Detect, isolate, notify and correct faults encountered in the network. This category analyzes traffic, trends, SMMP polls and alarms for automatic fault detection.
- Configuration Management—Configuration aspects of network devices include configuration file management, inventory management and software management.
- Accounting Management—Usage information of network resources.
- Performance Management—Monitor and measure various aspects of performance metrics so that acceptable performance can be maintained. This includes response time, link utilization and error rates. Administrators can monitor trends and set threshold alarms.
- Security Management—Provide access to network devices and corporate resources to authorized individuals. This category focuses on authentication, authorization, firewalls, network segmentation, IDS and notifications of attempted breaches.
LANs and WANs are particularly susceptible to people and virus-related threats because
of the large number
of people who have access rights.
The emphasis has been on providing capability and functionality rather than security.
True.