Domain 6. Security Assessment and Testing Flashcards

1
Q

BAS

A

Breach Attack Simulation

A BAS simulates a penetration test. Programs, such as Infection Monkey are open-source and great for this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Real User Monitoring AKA Passive monitoring

A

AKA Passive Monitoring

Real user monitoring (RUM) analyzes the traffic or status of transactions for real user traffic. This is also known as passive monitoring. RUM provides real-time updates on the status of user interactions for a given service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Synthetic Monitoring

A

Same as Active Monitoring

Synthetic monitoring actively makes transactions against a website to evaluate performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Active Monitoring

A

Same as Synthetic Monitoring

Synthetic monitoring actively makes transactions against a website to evaluate performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Risk Indicator

A

KRIs, however, measure the organization’s risk and how its risk profile changes. This provides the ability to assess the likelihood of a negative event, as well as assess the risk level of an activity or situation. The risks, if realized, can typically profoundly impact the organization. Therefore, KRIs can strongly impact decision-making by senior-level executives.

Examples:
Vulnerability Metrics
Policy Exception Rates
Malware Infection Rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Misuse Case Testing

A

Misuse case testing is used to help identify potential security flaws in a software’s design by examining how software could be abused or manipulated into doing something malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSAE 18 and ISAE 3402

A

The Statement on Standards for Attestation Engagements (SSAE 18) and the International Standard for Attestation Engagements (ISAE 3402) are service organization controls (SOC) audits.

SSAE 18 is an American national auditing system, while the ISAE 3402 is a very similar system used internationally. Both are standards used by companies to audit other companies in their jurisdiction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DRP vs BCP

A

Disaster Recovery Plan, Business Continuity Plan

DRP = Business has ceased and needs to be recovered

BCP = Plans to operate THROUGH a disaster, NOT recover from one. Answers the question “How do we continue operating before DRP has been fully realized?”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

KPI

A

Key Performance Indicator

helps to evaluate a process’s health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fuzz Testing

A

Fuzz testing is a technique used to find flaws or vulnerabilities by sending randomly generated or specially crafted inputs into the software. There are two types of fuzzers: mutation (dumb) fuzzers and generational (Intelligent) fuzzers. Mutation fuzzers mutate input to create fuzzed input. Generational fuzzers create fuzzed input based on what type of program is being fuzzed.

Fuzz testing may not cover all of the code to be tested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Synthetic Transactions

A

Synthetic transactions ensure that whatever text is expected comes out when requested. This is excellent practice to test code and validate input, especially against potential attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exposure Factor

A

Amount of asset that is at risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NIST SP-800-53a

A

“Assessing security and privacy controls in Federal Information Systems and orgs.”

Covers methods for assessing and measuring security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST 800-12

A

Intro to Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIST 800-34

A

Covers contigency planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIST 800-86

A

Guide to integrating forensic techniques into incident response.

17
Q

What is an Interface (in context of security assessment)?

A

The logical or physical point where two systems or a user interact with each other

18
Q

SQLMap

A

Tool designed to identify database vulnerabilities in web applications.

19
Q

Nikto

A

Webapp scanner

20
Q

Security Test

A

Tool or process to verify a control is functioning properly. Includes automated scans, tool assisted pen tests, and manual attempts to undermine security.

21
Q

COBIT

A

Control Objectives for Information Technologies

The COBIT framework specifically manages control variables within IT and how they align with business practices. COBIT is a healthy approach to balancing IT responsibilities and tailoring them to business needs.

22
Q

Automated integrity checking

A

automated integrity checking can determine if files have been changed. If the files have been altered, automated integrity checks can occur with the backup drives upon integrating them into production.

23
Q

Fagan Testing

A

Six Step software testing:

he following are the six steps of a Fagan inspection:

Planning
Overview
Preparation
Inspection
Rework
Follow-up

24
Q

Business Impact Analysis steps

A
  1. Identification of Priorities
  2. Risk identification
  3. Resource Prioritization