Vulnerability Management Flashcards
Seeks to identify any issues in a network, application, database, or other
systems prior to it being used that might compromise the system
Vulnerability Assessment
Practice of finding and mitigating the vulnerabilities in computers and
networks
Vulnerability Management
Occurs when an attacker moves onto another workstation or user
account
Pivot
Ability of an attacker to maintain a foothold inside the compromised
network
Persistance
Exercise that uses an incident scenario against a framework of controls or
a red team
Tabletop Exercise (TTX)
A test that uses active tools and security utilities to evaluate security by
simulating an attack on a system to verify that a threat exists, actively
test it, bypass security controls, and then finally exploit vulnerabilities on
a given system
Penetration Test
The hostile or attacking team in a penetration test or incident
response exercise
Red Team
The defensive team in a penetration test or incident response
exercise
BLue Team
Staff administering, evaluating, and supervising a penetration test
or incident response exercise
White team
A standard designed to regulate the transfer of secure public information
across networks and the Internet utilizing any security tools and services
available
Open Vulnerability and Assessment Language (OVAL)
An XML schema used to define and describe the information being
created by OVAL to be shared among the various programs and tools
OVAL Language
A reference developed to ensure the information passed around by these
programs complies with the OVAL schemas and definitions used by the
OVAL language
OVAL Interpreter
Baselining of the network to assess the current security state of
computers, servers, network devices, and the entire network in general
Vulnerability Assessment
Discovery and documentation of physical and logical connectivity
that exists in the network
Network Mapping
A technique that identifies threats on the network without
exploiting them
Vulnerability Scanning