CISSP ch 15 Flashcards

(105 cards)

1
Q

Security tests

A

verify that a control is functioning properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security assessments

A

comprehensive reviews of the security of a system, application or other tested environment

Identifies vulnerabilities in the tested environment. does not usually include actual mitigation of those vulnerabilities

Thoughtful review of the threat environment, current and future risks, and the value of the targeted environment

hould be addressed to the organization’s management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NIST SP 800-53A

A

Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans = best practices in conduct security and privacy assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Specifications (NIST SP 800-53A)

A

documents associated with the system being audited (e.g., policies, procedures, requirements and designs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mechanisms (NIST SP 800-53A)

A

controls used within an information system to meet the specifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Activities (NIST SP 800-53A)

A

actions carried out by people within an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Individuals (NIST SP 800-53A)

A

people who implement specifications, mechanisms and activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security audits

A

use many of the same techniques followed during security assessments but must be performed by independent auditors

Less routine than tests or assessments

Purpose of demonstrating the effectiveness of controls to a third party (as opposed to purely internal distribution)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internal audits

A

performed by an organization’s internal audit staff and are typically intended for internal audiences

Reporting line that is completely independent of the functions they evaluate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CAE

A

Chief Auditing Executive = may have reporting responsibility directly to the organization’s governing board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSAE 18

A

Statement on Standards for Attestation Engagements, document 18 ‘Reporting on Controls’ (produced by the American Institute of Certified Public Accountants / AICPA)

Provides a common standard to be used by auditors performing assessments of service organizations with the intent of allowing the organization to conduct an external assessment instead of multiple third-party assessments and then sharing the resulting report with cutomers and potential customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISAE 3402

A

International Standard for Attestation Engagements 3402 ‘Assurance Reports on Controls at a Service Organization’ = SSAE 18 equivalent used outside of U.S.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SOC aduits

A

Service organization controls audit = SSAE 18 and ISAE 3402

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SOC 1 engagements

A

asses the organization’s controls that might impact the accuracy of financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SOC 2 engagements

A

Assess the organization’s controls that affect the security (confidentiality, integrity and availability) and privacy of information stored in a system

SOC 2 audit results are confidential and normally are only shared outside the organization under and NDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SOC 3 Engagements

A

Assess the organization’s controls that affect the security (confidentiality, integrity and availability) and privacy of information stored in a system

SOC 3 audit results are intended for public disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Type I Reports

A

provide the auditor’s opinion on the description provided by management and the suitability of the design of the controls

Cover only a specific point in time, rather than an extended period

More of a documentation review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Type II reports

A

provide the auditor’s opinion on the operating effectiveness of the controls

The auditor actually confirms that the controls are functioning properly

Covers an extended period of time, at least six months of operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

COBIT

A

Control Objectives for Information and Related Technologies, maintained by ISACA

Common framework for conducting audits and assessments

Describes the common requirements that organizations should have in place surrounding their information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ISO 27001

A

standard approach for setting up an information security management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ISO 27002

A

goes into more detail on the specifics of information security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SCAP

A

NIST’s Security Content Automation Protocol = common framework for describing and evaluating vulnerabilities, and facilitates the automation of interactions between different security systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CVE (SCAP)

A

Common Vulnerabilities and Exposures = naming system for describing security vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CVSS (SCAP)

A

Common Vulnerability Scoring System = standardized scoring system for describing the severity of security vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CCE (SCAP)
Common Configuration Enumeration = naming system for systems configuration issues
26
CPE (SCAP)
Common Platform Enumeration = naming system for operating systems, applications and devices
27
XCCDF (SCAP)
Extensible Configuration Checklist Description Format = language for specifying security checklists
28
OVAL (SCAP)
Open Vulnerability and Assessment Language = language for describing security testing procedures
29
Vulnerability scans
automatically probe systems, applications and networks looking for weaknesses that may be exploited by an attacker
30
Network discovery scanning
variety of techniques to scan a range of IP addresses, searching for systems with open network ports
31
TCP SYN Scanning = half-open scanning (network discovery)
Sends a single packet to each scanned port with the SYN flag set, indicating a request to open a new connection If the scanner receives a response that has the SYN and ACK flags set, this indicates that the system is moving to the second phase in the three-way TCP handshake and that the port is open
32
TCP Connect Scanning (network discovery)
Opens a full connection to the remote system on the specified port Used when the user running the scan does not have the necessary permissions to run a half-open scan (i.e., user cannot send hand-crafted packets)
33
TCP ACK Scanning (network discovery)
Sends a packet with the ACK flag set, indicating that it is part of an open connection May be done in an attempt to determine the rules enforced by a firewall and the firewall methodology
34
UDP scanning (network discovery)
Performs a scan of the remote system using the UDP protocol, checking for active UDP services Does not use the three way handshake, because UDP is a connectionless protocol
35
Xmas scanning (network discovery)
Sends a packet with the FIN, PSH and URG flags set A packet with so many flags is said to be ‘lit up like a Christmas tree’
36
nmap
most common tool used for network discovery scanning = provides the current status of ports
37
Open (nmap)
the port is open on the remote system and there is an application that is actively accepting connections on that port
38
Closed (nmap)
the port is accessible on the remote system, meaning that the firewall is allowing access, but there is no application accepting connections on that port
39
Filtered (nmap)
Nmap is unable to determine whether a port is open or closed because a firewall is interfering with the connection attempt
40
Banner grabbing
technique used by port scanners, network vulnerability scanners and web vulnerability scanners to identify the variant and version of a service running on a service Opens a connection to the service and reads the details provided on the welcome screen or banner to assist with version fingerprinting
41
netstat command
useful tool for examining the active ports on a system = lists all active network connections on a system as well as those ports that are open and awaiting new connections
42
network vulnerability scans
go deeper than discovery scans, don’t stop at detecting open ports but continue to probe a targeted system or network for the presence of known vulnerabilities These tools contain databases of thousands of known vulnerabilities along with tests they can perform to identify whether a system is susceptible to each vulnerability in the system’s database
43
Authenticated scans
scanner has read-only access to the servers being scanned and can use this access to read configuration information from the target system and use that information when analyzing vulnerability testing results
44
TCP Port 20
FTP file transfer protocol
45
TCP Port 22
SSH secure shell
46
TCP Port 23
Telnet (remote access)
47
TCP Port 25
SMTP (unencrypted mail)
48
TCP Port 53
DNS domain name system (domain name to IP address)
49
TCP Port 80
HTTP (unencrypted)
50
TCP Port 110
POP3 (email retrieval)
51
TCP Port 123
NTP network time protocol, time synchronization
52
TCP Port 21
FTP file transfer protocol
53
TCP Port 135
Windows File Sharing
54
TCP port 137
Windows File Sharing
55
TCP port 138
Windows File Sharing
56
TCP port 139
Windows File Sharing
57
TCP port 445
Windows File Sharing
58
TCP port 443
HTTPS
59
TCP port 515
LPR/LPD (printing)
60
TCP port 1433
Microsoft SQL Server
61
TCP port 1434
Microsoft SQL Server
62
TCP port 1521
Oracle
63
TCP port 1720
H.323 (VoIP)
64
TCP port 1723
PPTP (point to point tunneling, VPN)
65
TCP port 3389
RDP remote desktop protocol
66
TCP port 9100
HP JetDirect printing
67
OpenVAS
open source vulnerability scanner
68
Sqlmap
a commonly used open source database vulnerability scanner
69
Penetration testing
goes beyond vulnerability testing techniques and actually attempts to exploit systems = Try to defeat security controls and break into a targeted system or application to demonstrate the flaw
70
Metasploit framework
tool commonly used by penetration testers to automatically execute exploits against targeted systems
71
White-box penetration test
known environment tests provides the attackers with detailed information about the systems they target, bypassing many of the reconnaissance steps, shortening the time of the attack and increasing the likelihood of finding security flaws
72
gray-box penetration test
partial knowledge tests = partially known environment tests particularly common when black-box results are desired but costs or time constraints mean that some knowledge is needed to complete the testing
73
black-box penetration test
unknown environment tests does not provide attackers with any information prior to the attack simulates an external attacker trying to gain access to information about the business and technical environment before engaging in an attack
74
BAS platforms
breach and attack simulation platforms = seek to automate some aspects of penetration testing
75
NIST 800-115
industry standard penetrating testing methodology
76
OSSTMM
Open Source Security Testing Methodology Manual industry standard penetrating testing methodology
77
compliance checks
verify that all of the controls listed in a compliance plan are functioning properly and are effectively meeting regulatory requirements
78
exception handling
process of handling unexpected activity (e.g., invalid input, improperly sequenced activity)
79
code review / peer review
where developers other than the one who wrote the code review it for defects
80
Fagan inspections
most formal code review processes Planning Overview Preparation Inspection Rework Follow-up
81
SAST
static application security testing = evaluates the security of software without running it by analyzing either the source code or the compiled application Involves the use of au
82
DAST
dynamic application security testing = evaluated the security of software in a runtime environment and is often the only option for organizations deploying applications written by someone else Testers often do not have access to the underlying source code E.g., use of web application scanning tools to detect the presence of cross-site scripting, SQL injection or other flaws in web applications May include the use of synthetic transactions (i.e., scripted transactions with known expected results); testers run synthetic transactions against the tested code and then compare the output of the transactions to the expected state
83
IAST
Interactive application security testing = performs real-time analysis of runtime behavior, application performance, HTTP/HTTPS traffic, frameworks, components and background connections
84
RASP
Runtime Application Self-Protection = a tool that runs on a server and intercepts calls to and from an application and validates data requests
85
fuzz testing
a specialized dynamic testing technique that provides many different types of input to software to stress its limits and find previously undetected flaws = Supplies invalid input to the software, either randomly generated or specially crafted to trigger known software vulnerabilities
86
Mutation (dumb) fuzzing
Takes previous input values from actual operation of the software and manipulates (or mutates) it to create fuzzed input Might alter the characters of the content, append strings to the end of the content or perform other data manipulation techniques
87
generational (intelligent) fuzzing
Develops data models and creates new fuzzed input based on an understanding of the types of data used by the program
88
zzuf tool
automates the process of mutation fuzzing by manipulating input according to user specifications
89
bit flipping
changing text so that it is almost identical to the original text, but with a modified bit (1 changed to 0)
90
interface testing
assesses the performance of separately developed modules against the interface specifications to ensure that they will work together properly when all the development efforts are complete
91
APIs
Application Programming Interfaces Offer a standardized way for code modules to interact and may be exposed to the outside world through web services Must be tested to ensure that they enforce all security requirements
92
UIs
User Interfaces E.g., GUIs (graphic user interfaces) and command-line interfaces Provide end users with the ability to interact with the software
93
test coverage analysis
used to estimate the degree of testing conducted against the new software test coverage = number of use cases tested / total number of uses cases A highly subjective calculation
94
branch coverage (test coverage analysis)
Has every ‘if’ statement been executed under all ‘if’ and ‘else’ conditions?
95
condition coverage (test coverage analysis)
Has every logical test in the code been executed under all sets of inputs?
96
function coverage (test coverage analysis)
Has every function in the code been called and returned results?
97
loop coverage (test coverage analysis)
Has every loop in the code been executed under conditions that cause code execution multiple times, only once, and not at all?
98
statement coverage (test coverage analysis)
Has every line of code been executed during the test?
99
passive website monitoring
Analyzes actual network traffic sent to a website by capturing it as it travels over the network or reaches the server Provides real-world monitoring data that gives administrators insight into what is actually happening on a network
100
RUM (website monitoring)
real user monitoring = a variant of passive monitoring where the monitoring tool reassembles the activity of individual users to track their interaction with a website
101
active website monitoring / synthetic monitoring
Performs artificial transactions against a website to assess performance
102
SIEM packages
security information and event management packages = automate much of the routine work of log review
103
syslog functionality
present in many devices, operating systems and applications = used by SIEM packages to collect information
104
Windows' GPOs
Group Policy Objects = mechanism that can deploy and enforce standard policies through the organization = can deploy a logging policy
105
NetFlow logs
network flow logs that provide records of the connections between systems and the amount of data transferred = particularly useful when investigating security incidents