Chapter 5 Flashcards

Security Assessment and Testing

1
Q

Vulnerability Management

A

The process of finding and patching vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asset Criticality

A

Determination of the importance of an asset to the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset Inventory

A

Systematic method of tracking hardware, software, and information assets owned by an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Appetite

A

An organization’s willingness to tolerate risk within the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Regulatory Requirements

A

Requirements created by regulations and laws applicable to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Technical Constraints

A

May limit the frequency of scanning. The scanning system may only be capable of performing a certain number of scans per day and organizations may need to adjust scan frequency to ensure that all scans complete successfully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Business Constraints

A

In terms of vulnerability, they may limit the organization form conducting resource-intensive vulnerability scans during periods of high business activity to avoid disruption of critical processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Licensing limitations

A

May limit the bandwith consumed by the vulnerability scanner or the number of scans that may be conducted simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Credentialed Scanning

A

A type of vulnerability scan where the scanner has login credentials to access the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Agent-Based Scanning

A

The use of software agents installed on target devices to assist with vulnerability scans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Server-based scanning

A

An approach to vulnerability scanning that relies on servers rather than local agents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scan Perspective

A

An aspect that conducts the scan from a different location on the network, providing a different view into vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What controls might affect scan results?

A
  1. Firewall settings
  2. Network segmentation
  3. Instrusion detections systems (IDS)
  4. Instrusion prevention systems (IPS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vulnerability Feed

A

A constantly updated list of security weaknesses in software, hardware, or networks that helps cybersecurity professionals stay informed about threats and fixes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Content Automation Protocol (SCAP)

A

Led by the National Institute of Standards and Technology (NIST), to create a standardized approach for communicating security- related information. This standardization is important to the automation of interactions between security components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Common configuration enumeration (CCE)

A

Provides a standard nomenclature for discussing system configuration issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Common platform enumeration (CPE)

A

Provides a standard nomenclature for describing product names and versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Common vulnerabilities and exposures (CVE)

A

Provides a standard nomenclature for describing security-related software flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Common vulnerability scoring system (CVSS)

A

Security Content Automation Protocol (SCAP) component that provides a standardized scoring system for describing the characteristics and severity of security vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Extensible Configuration Checklist Description Format (XCCDF)

A

A specification language used to create security checklists, benchmarks, and rules for configuring systems securely. It helps automate compliance testing and ensures consistent security practices across systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Open vulnerability and assessment language (OVAL)

A

A language for specifying low-level testing procedures used by checklists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are 4 of the most commonly used network vulnerability scanners?

A
  1. Tenable’s Nessus
  2. Qualys vulnerability scanner
  3. Rapid7’s Nexpose
  4. OpenVAS (open source)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Static Testing

A

Analyzes code without executing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Dynamic Testing

A

Executes code as part of the test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Interactive Testing
combines static and dynamic testing.
26
Attack Vector Metric (AV)
Describes how an attacker would exploit a vulnerability. Possible Values: - Physical (P): Requires physical access. - Local (L): Requires local access (e.g., logged-in user). - Adjacent Network (A): Requires exploitation within the same network segment. - Network (N): Exploitation occurs remotely over a network.
27
Attack Complexity Metric (AC)
Describes the difficulty of exploiting a vulnerability. Possible Values: - Low (L): Straightforward attack; no special conditions required. - High (H): Complex attack; requires specific conditions like user interaction or environmental factors.
28
Privileges Required (PR) Metric
Describes the type of account access that an attacker would need to exploit a vulnerability. Possible Values: - None (N): No access or privileges required. - Low (L): Basic user privileges required. - High (H): Administrative or root privileges required.
29
User Interaction metric (UI)
Describes whether the attacker needs to involve another human in the attack. Possible Values: - None (N): No user interaction needed for exploitation. - Required (R): Exploitation depends on the user performing an action (e.g., clicking a link, opening a file).
30
Confidentiality Metric (C)
Describes the type of information disclosure that might occur if an attacker successfully exploits a vulnerability. Possible Values: - None (N): No sensitive information is disclosed. - Low (L): Limited access to non-critical information. - High (H): Full access to sensitive or critical data.
31
Integrity Metric (I)
Describes the type of information alteration that might occur if an attacker successfully exploits the vulnerability. Possible Values: - None (N): No effect on integrity. - Low (L): Limited, non-critical modifications possible. - High (H): Major changes, compromising critical data or systems.
32
Availability Metric (A)
Describes the type of disruption that might occur if an attacker successfully exploits the vulnerability. Possible Values: - None (N): No impact; system remains fully operational. - Low (L): Limited disruption; system partially usable. - High (H): Complete disruption; system becomes unavailable.
33
Scope Metric (S)
Describes whether the vulnerability can affect system components beyond the scope of the vulnerability. Possible Values: - Unchanged (U): Impact is confined to the vulnerable component's security scope. - Changed (C): Impact affects other systems or components beyond the vulnerable component.
34
CVSS Vector
Uses a single-line format to convey the ratings of a vulnerability on all eight of the metrics. Ex: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Breakdown: - CVSS:3.1: Version of CVSS used (e.g., 3.1). - AV:N: Attack Vector = Network. - AC:L: Attack Complexity = Low. - PR:N: Privileges Required = None. - UI:N: User Interaction = None. - S:U: Scope = Unchanged. - C:H: Confidentiality Impact = High. - I:H: Integrity Impact = High. - A:H: Availability Impact = High.
35
CVSS Qualitative Severity Rating Scale
Score & Rating 0.0 == None 0.1 - 3.9 == Low 4.0 - 6.9 == Medium 7.0 - 8.9 == High 9.0 - 10.0 == Critical
36
False Positive Error
When a scanner reports a vulnerability that does not exist.
37
Positive Report
When a vulnerability scanner reports a vulnerability.
38
Negative Report
When a scanner reports a vulnerability is not present.
39
What are good vulnerability response and remediation practices?
Good vulnerability response and remediation involve identifying, prioritizing, communicating, documenting, patching, validating, and continuously monitoring systems to address security weaknesses effectively
40
Penetration Test Types
There are four major categories of penetration testing: 1. Physical penetration testing 2. Offensive penetration testing 3. Defensive penetration testing 4. Integrated penetration testing
41
Physical Penetration Testing
Assesses physical security measures like locks, breaking into buildings, access controls, and surveillance systems. Purpose: Simulates real-world breaches to identify vulnerabilities in physical defenses.
42
Offensive Penetration Testing
Definition: Simulates attacks to exploit vulnerabilities in systems, networks, or applications. Purpose: Mimics real attackers to uncover weaknesses before exploitation occurs.
43
Defensive Penetration Testing
Evaluates and strengthens defensive measures, focusing on detection and response capabilities. Purpose: Tests how well security controls respond to simulated attacks.
44
Integrated Penetration Testing
Combines physical, offensive, and defensive approaches for comprehensive security assessment. Purpose: Provides an overall evaluation of an organization’s security posture.
45
Environment Tests
Checking for security weaknesses, settings, and risks in different types of computer systems—like online (cloud), physical locations (on-premises), or a mix of both (hybrid)—to make sure everything stays safe and protected. There are three typical classifications: 1. Known Environment 2. Unknown Environment 3. Partially Known Environment
46
Rules of engagement (RoE)
The rules that are agreed to for a penetration test. These rules are defined before the test starts to ensure that the test does not cause inadvertent harm or go beyond the accepted scope.
47
What are the key components of Rules of Engagement (RoE) in cybersecurity?
1. Scope & Authorization *What’s included?* Systems, networks, apps—approved explicitly. 2. Timing Duration *When and how long?* Start time, duration, and limits. 3. Techniques and Methods *What methods?* Approved tools and tactics. 4. Reporting *Who needs to know?* Updates, findings, communication plans. 5. Restrictions *What’s off-limits?* Forbidden actions to ensure safety. 6. Incident Response *What if something goes wrong?* Guidelines for surprises or breaches.
48
Passive Reconnaissance
Seeks to gather information without directly engaging with the target.
49
Active Reconnaissance
This technique directly engages the target in intelligence gathering
50
The Process of a Penetration test
1. Initial Access 2. Privilege escalation 3. Pivoting, or Lateral movement 4. Attackers establish persistence Exploitation Frameworks, such as Metasploit, are used.
51
Three major components of a security assessment program
1. Security Tests 2. Security Assessments 3. Security Audits
52
Security Tests
Verify that a control is functioning properly.
53
Security Assessments
Comprehensive reviews of the security of a system, application, or other tested environment.
54
Security Audits
Use many of the same techniques followed during security assessments but must be performed by independent auditors.
55
Attestation
It’s an official confirmation from auditors that they’ve checked the security controls in place. They’re saying these controls not only meet the intended goals (control objectives) but are also functioning as expected.
56
What are the three main types of audits?
1. Internal Audits 2. External Audits 3. Third-Party Audits
57
Internal Audits
Performed by an organization's internal audit staff and are typically intended for internal audiences.
58
External Audits
Performed by an outside auditing firm who serves as an independent third party. "Big Four" audit firms: 1. Ernst & Young 2. Deloitte 3. PricewaterhouseCoopers(PwC) 4. KPMG
59
Independent Third-Party Audits
A subcategory of external audits; Audits conducted by, or on behalf of, another organization.
60
Control Objectives for Information and related Technologies (COBIT)
Describes the common requirements that organizations should have in place surrounding their information systems.
61
Vulnerability Life Cycle
Identification --> Analysis --> Response and Remediation --> Validation of Remediation --> Reporting (Repeat)
62
Identification (Vulnerability Life Cycle)
First stage in the process. The Organization becomes aware of a vulnerability that exists within their environment.
63
Analysis (Vulnerability Life Cycle)
Second Stage. Cybersecurity professionals perform an analysis of the report previously made. Assessing the severity and impact of the vulnerability.
64
Response and Remediation (Vulnerability Life Cycle)
Third Stage. Involves addressing identified vulnerabilities to mitigate risks and enhance security. Response: Actions taken to analyze, notify, and prioritize vulnerabilities. This phase focuses on understanding the impact and communicating findings to stakeholders. Remediation: Actions taken to fix a vulnerability and secure the system, such as deploying patches, adjusting configurations, or using mitigation strategies.
65
Validation of Remediation (Vulnerability Life Cycle)
Fourth Stage. Professionals make sure that the vulnerability no longer is present. Auditors make sure the issue is resolved.
66
Reporting (Vulnerability Life Cycle)
Final Stage. Involves communicating the findings, actions taken, and lessons learned to relevant stakeholders within the organization.