Topic 1 Flashcards
Administrative Controls
Security measures implemented to monitor the adherence to organizational policies and procedures. Those include activities such as hiring and termination policies, employee training along with creating business continuity and incident response plans.
Physical Controls
Restrict, detect and monitor access to specific physical areas or assets. Methods include barriers, tokens, biometrics or other controls such as ensuring the server room doors are properly locked, along with using surveillance cameras and access cards.
Technical or Logical Controls
Automate protection to prevent unauthorized access or misuse, and include Access Control Lists (ACL), and Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) signatures and antimalware protection that are implemented as a system hardware, software, or firmware solution.
Principle of Least Privilege
which states that an object should only be allocated the minimum necessary rights, privileges, or information in order to perform its role.
Risk
represents the consequence of a threat exploiting a vulnerability. When dealing with cybersecurity, a risk can result in financial loss, business disruption, or physical harm. The formula for determining risk is as follows:
Risk = Threat x Vulnerability
Threat
A threat represents something such as malware or a natural disaster, that can accidentally or intentionally exploit a vulnerability and cause undesirable results.
Vulnerability
A vulnerability is a weakness or flaw, such as a software bug, system flaw, or human error. A vulnerability can be exploited by a threat
Risk Management
The cyclical process of identifying, assessing, analyzing, and responding to risks.
Main Steps of the Structure Pentesting Process
- Planning and Scoping
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Covering Tracks
- Analysis
- Reporting
The Threat actor will use the same steps, except 1, 7, and 8. The threat actor has a main goal of altering the integrity of the system and/or causing harm.
GDPR
General Data Protection Regulation (GDPR), which outlines specific requirements on how consumer data is protected.The law affects anyone who does business with residents of the EU and Britain. This comprehensive law focuses on the privacy of consumer data and, more importantly, gives consumers the ability to control how their data is handled.
OWASP
Open Web Application Security Project
NIST Guide to Pentesting
NIST SP 800-115 is the “Technical Guide to Information Security Testing and Assessment.”
OSSTMM
Open-source Security Testing Methodology Manual
ISSAF
Information Systems Security Assessment Framework
PTES
Penetration Testing Execution Standard
seven main sections that provide a comprehensive overview of the proper structure of a complete PenTest. Some of the sections include details on topics such as:
Preengagement interactions
Threat modeling
Vulnerability analysis
Exploitation
Reporting
MITRE ATT&CK
Adversarial Tactics, Techniques & Common Knowledge
CVSS CVE and CWE
Common Vulnerability Scoring System
Common Vulnerabilities and Exposures -
The CVE is a listing of all publicly disclosedvulnerabilities. Each entry refers to specific vulnerability of a particular product and iscataloged
CVE-[YEAR]-[NUMBER]
Common Weakness Enumeration - database of software-related vulnerabilities