study 4 Flashcards
Refers to attack and control circumvention attempts on a target’s network perimeter from outside the target’s system, usually the Internet
External Testing
Refers to attack and control circumvention attempt on target from within the perimeter. The objective is to identify what would occur if the external perimeter was successfully compromised and/or an authorized user from within the network wanted to compromise security of a specific resource on a network.
Internal Testing
Refers to the condition of testing when the penetration tester is provided with limited or no knowledge of the target’s information systems. Such testing is expensive, since penetration tester have to research the target and profile it based on publicly available information.
Blind Testing
It is a extension of blind testing, since the administrator and security staff at the target are also not aware of test. Such a testing can effectively evaluate the incident handling and response capability of the target and how well managed the environment is.
Double Blind Testing
Refers to attack and control circumvention attempts on the target, while both the target’s IT team and penetration tester are aware of the testing activities. Penetration testers are provided with information related to target and network design. Additionally, they are also provided with a limited privilege user account to be used as a starting point to identify privilege escalation possibilities in the system.
Targeted Testing
Personnel who review result and deliverables within each phase and at the end of each phase, and confirm compliance with requirements. Their objective is to ensure that the quality of the project by measuring adherence of the project staff to the organization’s software development life cycle (SDLC), advise on the deviation and propose recommendation for process improvement or greater control points when deviation occur.
Quality Assurance
Ensures that system controls and supporting processes provides an effective level of protection, based on the data classification set in accordance with corporate security policies and procedures: consult throughout the life cycle on appropriate security measures that should be incorporated into the system.
Security Officer
Completes assigned tasks, communicate effectively with the system developers by actively involving themselves in the development process as Subject Matter Expert (SME) and works according to local standards, and advise the project manager of expected and actual project deviations.
User Project Team
Completes assigned tasks, communicates effectively with user by actively involving them in the development process, works according to local standards, and advise the project manager of necessary plan deviations.
System Development Project Team
Project sponsor provides funding for the project and works closely with the project manager to define critical success factor(CSFs) and metrics for measuring the success of the project. It is crucial that success is translated to measurable and quantifiable terms. Data and application ownership are assigned to a project sponsor. A project sponsor is typically the senior manager in charge of the primary business unit that the application will support.
Project Sponsor
Provides day-to-day management and leadership of the project, ensures that project activities remain in line with the overall directions, ensures appropriate representation of the affected departments, ensures that the project adheres local standards, ensures that deliverable meet the quality expectation of key stakeholder, resolve interdepartmental conflict, and monitors and controls cost of the project timetables.
Project Manager
Provides technical support for hardware and software environment by developing, installing and operating the requested system.
System Development Management
Provides overall directions and ensures appropriate representation of the major stakeholders in the project’s outcome. The project steering committee is ultimately responsible for all deliverables, project costs and schedules. This committee should be compromised of senior representative from each business area that will be significantly impacted by the proposed new system or system modifications.
Project Steering Committee
Demonstrate commitment to the project and approves the necessary resources to complete the project. This commitment from senior management helps ensure involvement by those needed to complete the project.
Senior Management
Assumes ownership of the project and resulting system, allocates qualified representatives to the team, and actively participates in business process redesign, system requirement definitions, test case development, acceptance testing and user training.
User Management
A certificate is a digital document that at a minimum includes what?
- a Distinguished Name (DN)
2. an associated public key
is used to match an IP address to an Ethernet address so the packet can be sent to the appropriate node.
The Address Resolution Protocol (ARP)
is used to match an Ethernet address to an IP address
Reverse address resolution protocol (RARP)
L2TP Protocol works at what layer?
data link layer
Secure Sockets Layer (SSL): Works at what layer?
transport layer
IPSec: Works at what layer?
network layer, and provides security on top of IP
Point-to-Point Tunneling Protocol (PPTP) Works at what layer?
data link layer
What protection devices is used for spot protection within a few inches of the object,
Capacitance detectors
is the act of gathering the necessary information so the best decision-making activities can take place.
Due Diligence
a gateway act as a ? Device
translation device
It could be used to translate from IPX to TCP/IP
A bridge work at what layer
at the data link layer
token ring IEEE #
802.5
IEEE 802.2 refers to what?
the logical link control
IEEE 802.11 refers to what?
wireless communications
IEEE 802.3 refers to what?
Ethernet’s CSMA/CD
is used to send encrypted information using symmetric keys, and the relevant session key along with it. It is a secure method to send electronic document without compromising the data integrity,
Digital Envelope
he most common method of session hijacking is called
P spoofing
a computer with a ? firewall would respond to ACK packets sent to port TCP/80 when the port should not respond to unsolicited ACK packets for a non-existent TCP session.
stateless firewall
From most effective (lowest CER) to least effective (highest CER) are? (4)
- Iris scan,
- fingerprint,
- voice verification
- keystroke dynamics
a hamming code is used to create
parity information?
confirms that users’ needs have been met by the supplied solution.
Acceptance
is the formal testing of security safeguards and assurance is the degree of confidence that the implemented security measures work as intended.
Certification
Once an intrusion into your organization’s information system has been detected, the first action that needs to be performed
Determine to what extent systems and data may be compromised.
using mathematical properties of modular arithmetic and a method known as
Computing in Galois fields
In which phase of the System Development Lifecycle (SDLC) is Security Accreditation Obtained?
Testing and evaluation control
n which phase of the System Development Lifecycle (SDLC) is implementation
Transition to production
decision support system (DSS) is know as
Delphi Method or Delphi Technique:
The main purpose of off-site hardware testing to ensure What?
The continued compatibility of the contingency facilities.
provides protection against sniffing and replay attacks but also provides message authentication and integrity.
SRTP - Secure Real-time Transport Protocol
SRTP uses what as the default cipher.
AES - Advanced Encryption Standard
is used on the Local Area Network (LAN) to obtain an IP address from it’s known MAC address?
is used on the Local Area Network (LAN) to obtain an IP address from it’s known MAC address?