Chapter 5 Flashcards
Security Assessment and Testing
Vulnerability Management
The process of finding and patching vulnerabilities.
Asset Criticality
Determination of the importance of an asset to the business.
Asset Inventory
Systematic method of tracking hardware, software, and information assets owned by an organization.
Risk Appetite
An organization’s willingness to tolerate risk within the environment.
Regulatory Requirements
Requirements created by regulations and laws applicable to an organization.
Technical Constraints
May limit the frequency of scanning. The scanning system may only be capable of performing a certain number of scans per day and organizations may need to adjust scan frequency to ensure that all scans complete successfully.
Business Constraints
In terms of vulnerability, they may limit the organization form conducting resource-intensive vulnerability scans during periods of high business activity to avoid disruption of critical processes.
Licensing limitations
May limit the bandwith consumed by the vulnerability scanner or the number of scans that may be conducted simultaneously.
Credentialed Scanning
A type of vulnerability scan where the scanner has login credentials to access the target system.
Agent-Based Scanning
The use of software agents installed on target devices to assist with vulnerability scans.
Server-based scanning
An approach to vulnerability scanning that relies on servers rather than local agents.
Scan Perspective
An aspect that conducts the scan from a different location on the network, providing a different view into vulnerabilities.
What controls might affect scan results?
- Firewall settings
- Network segmentation
- Instrusion detections systems (IDS)
- Instrusion prevention systems (IPS)
Vulnerability Feed
A constantly updated list of security weaknesses in software, hardware, or networks that helps cybersecurity professionals stay informed about threats and fixes.
Security Content Automation Protocol (SCAP)
Led by the National Institute of Standards and Technology (NIST), to create a standardized approach for communicating security- related information. This standardization is important to the automation of interactions between security components.
Common configuration enumeration (CCE)
Provides a standard nomenclature for discussing system configuration issues.
Common platform enumeration (CPE)
Provides a standard nomenclature for describing product names and versions.
Common vulnerabilities and exposures (CVE)
Provides a standard nomenclature for describing security-related software flaws.
Common vulnerability scoring system (CVSS)
Security Content Automation Protocol (SCAP) component that provides a standardized scoring system for describing the characteristics and severity of security vulnerabilities.
Extensible Configuration Checklist Description Format (XCCDF)
A specification language used to create security checklists, benchmarks, and rules for configuring systems securely. It helps automate compliance testing and ensures consistent security practices across systems.
Open vulnerability and assessment language (OVAL)
A language for specifying low-level testing procedures used by checklists.
What are 4 of the most commonly used network vulnerability scanners?
- Tenable’s Nessus
- Qualys vulnerability scanner
- Rapid7’s Nexpose
- OpenVAS (open source)
Static Testing
Analyzes code without executing it.
Dynamic Testing
Executes code as part of the test