Topic 1 Flashcards

1
Q

Administrative Controls

A

Security measures implemented to monitor the adherence to organizational policies and procedures. Those include activities such as hiring and termination policies, employee training along with creating business continuity and incident response plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Physical Controls

A

Restrict, detect and monitor access to specific physical areas or assets. Methods include barriers, tokens, biometrics or other controls such as ensuring the server room doors are properly locked, along with using surveillance cameras and access cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Technical or Logical Controls

A

Automate protection to prevent unauthorized access or misuse, and include Access Control Lists (ACL), and Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) signatures and antimalware protection that are implemented as a system hardware, software, or firmware solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Principle of Least Privilege

A

which states that an object should only be allocated the minimum necessary rights, privileges, or information in order to perform its role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk

A

represents the consequence of a threat exploiting a vulnerability. When dealing with cybersecurity, a risk can result in financial loss, business disruption, or physical harm. The formula for determining risk is as follows:

Risk = Threat x Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat

A

A threat represents something such as malware or a natural disaster, that can accidentally or intentionally exploit a vulnerability and cause undesirable results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability

A

A vulnerability is a weakness or flaw, such as a software bug, system flaw, or human error. A vulnerability can be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Management

A

The cyclical process of identifying, assessing, analyzing, and responding to risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Main Steps of the Structure Pentesting Process

A
  1. Planning and Scoping
  2. Reconnaissance
  3. Scanning
  4. Gaining Access
  5. Maintaining Access
  6. Covering Tracks
  7. Analysis
  8. Reporting

The Threat actor will use the same steps, except 1, 7, and 8. The threat actor has a main goal of altering the integrity of the system and/or causing harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

GDPR

A

General Data Protection Regulation (GDPR), which outlines specific requirements on how consumer data is protected.The law affects anyone who does business with residents of the EU and Britain. This comprehensive law focuses on the privacy of consumer data and, more importantly, gives consumers the ability to control how their data is handled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OWASP

A

Open Web Application Security Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NIST Guide to Pentesting

A

NIST SP 800-115 is the “Technical Guide to Information Security Testing and Assessment.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSSTMM

A

Open-source Security Testing Methodology Manual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ISSAF

A

Information Systems Security Assessment Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PTES

A

Penetration Testing Execution Standard

seven main sections that provide a comprehensive overview of the proper structure of a complete PenTest. Some of the sections include details on topics such as:

Preengagement interactions
Threat modeling
Vulnerability analysis
Exploitation
Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MITRE ATT&CK

A

Adversarial Tactics, Techniques & Common Knowledge

17
Q

CVSS CVE and CWE

A

Common Vulnerability Scoring System

Common Vulnerabilities and Exposures -
The CVE is a listing of all publicly disclosedvulnerabilities. Each entry refers to specific vulnerability of a particular product and iscataloged
CVE-[YEAR]-[NUMBER]

Common Weakness Enumeration - database of software-related vulnerabilities