Domain 6: Security Assessment and Testing Flashcards
Study terminology used in evaluating, testing, and validating security controls.
Define:
Abuse Case Testing
A security testing approach where hypothetical scenarios of system misuse or hostile actions are examined to identify and address potential security weaknesses.
A testing methodology where scenarios are developed to anticipate and examine potential misuse or malicious behavior against a system. It aims to uncover potential vulnerabilities or flaws that might not be detected through traditional use case testing, which typically focuses on expected and correct usage. By considering the system from an adversary’s perspective, it’s possible to enhance the system’s defenses against illegitimate usage or attacks.
For more information, view this lecture on What is Abuse Case Testing?.
Define:
Attack Surface Management
Attack Surface Management identifies, monitors, and reduces all possible entry points for cyberattacks, ensuring organizations stay aware of changing assets and vulnerabilities across networks, endpoints, and cloud services.
Attack Surface Management is a continuous process of cataloging digital assets, such as servers, applications, domains, and exposed services, to detect vulnerabilities or misconfigurations that attackers might exploit. This approach involves automated discovery, risk scoring, and remediation prioritization, empowering security teams to swiftly address issues. By analyzing external and internal facing systems, organizations gain real-time visibility into evolving threats, prevent unauthorized access, and maintain compliance. Effectively managing the attack surface enhances overall cybersecurity posture and reduces the potential impact of breaches.
For more information, view this lecture on What is Attack Surface Management?.
Define:
Audit
A systematic and documented evaluation process to determine if agreed-upon criteria are met, assessing control effectiveness and system integrity in security.
A systematic, independent, and documented process for obtaining and evaluating objectively verifiable evidence to determine the extent to which agreed-upon criteria are met. In a security context, this might involve assessing the effectiveness of controls, compliance with security policies and regulations, or the accuracy of system logging. Audits are essential for identifying vulnerabilities, ensuring accountability, and enhancing overall security posture.
For more information, view this lecture on Security Audits. Or visit this Wikipedia page.
Define:
Audit Accountability
Ensuring individuals or entities conducting audits are responsible for their findings, with all audit activities and decisions documented for transparency.
The principle that ensures individuals or entities tasked with conducting audits are held responsible for their findings and actions. It requires that all audit activities, results, and decisions be properly documented, enabling transparency and traceability of the auditing process.
For more information, view this lecture on Security Audit Logs.
Define:
Audit Authority
The right granted to conduct audits, usually by a regulatory agency, allowing access to records and interviews to validate compliance and recommend improvements.
The power or right granted to an individual or organization to conduct an audit. This authority is typically granted by a governing body or regulatory agency and may include the ability to access records, interview individuals, and make recommendations for improvement. Examples of organizations with audit authority include the Internal Revenue Service and the Securities and Exchange Commission.
For more information, view this lecture on Security Audits.
Define:
Audit Charter
A document defining the audit’s purpose, authority, and responsibility, providing a framework for the audit’s scope, standards, and reporting process.
A formal document that outlines the purpose, authority, and responsibility of an audit activity. It provides a clear framework for the audit, including the scope of work to be performed, the standards to be adhered to, and the reporting process. An audit charter is essential for setting expectations, ensuring transparency, and fostering a cooperative relationship between the auditors and those being audited.
For more information, view this lecture on What is an Audit Charter?.
Define:
Audit Evidence
Information gathered during an audit to support findings and conclusions, including documentation and interviews to validate compliance and control effectiveness.
The information collected during an audit process to support the auditor’s conclusions. This could involve documentation, data analysis, physical checks, interviews, and other information sources. The evidence should be sufficient and appropriate in quality, and it aids in identifying anomalies, validating compliance, and assessing the effectiveness of controls in place.
For more information, view this lecture on Security Audit Logs. Or visit this Wikipedia page.
Define:
Audit Expert Systems
Computer systems that assist auditors by using specialized knowledge and databases to analyze complex data and improve audit quality and efficiency.
Computer-based systems that utilize specialized knowledge and databases to assist auditors in the decision-making process during an audit. These systems enable the processing and analysis of complex data sets to enhance the quality and efficiency of audits.
Define:
Audit Objective
The goal of an audit, which could be to assess regulations compliance, control effectiveness, or financial statement accuracy, guiding the audit process.
A clear, concise statement of what the audit is intended to achieve. It might involve assessing compliance with specific regulations, determining the effectiveness of certain controls, or evaluating the accuracy of financial reporting. The audit objective provides a guide for planning the audit, conducting the audit work, and assessing the results.
For more information, view this lecture on Security Audits. Or visit this Wikipedia page.
Define:
Audit Plan
A strategy outlining audit steps, methods, and resources, detailing the schedule, scope, objectives, and procedures for a systematic and structured audit.
A comprehensive strategy outlining the specific steps, methods, and resources to be used in an audit. It includes a schedule, a defined scope, the objectives, and procedures to achieve those objectives. This plan serves as a roadmap, guiding auditors in their tasks and ensuring a structured, systematic approach to the audit process.
For more information, view this lecture on Security Audits. Or visit this Wikipedia page.
Define:
Audit Program
A set of detailed actions and procedures to achieve audit objectives, tailored to each unique audit, factoring in the entity’s nature and complexity.
A set of procedures and steps designed to achieve the audit objectives. It is a detailed plan of action specifying the techniques to be used, the areas to be reviewed, and the chronological order of tasks. The program may be tailored to the unique needs of each audit, taking into consideration the nature, complexity, and size of the entity being audited.
For more information, view this lecture on Security Audits.
Define:
Audit Responsibility
The auditor’s duty to perform with professional care, maintaining objectivity, ensuring accurate reporting, and following relevant standards.
The accountability of the auditor in conducting an audit. It encompasses the duty to perform the audit with due professional care, maintain objectivity and independence, ensure accuracy in reporting, and comply with relevant standards and regulations. The auditor is also responsible for communicating the audit results in a clear, timely, and truthful manner.
Define:
Audit Risk
The chance that an auditor may incorrectly assess financial statements due to not detecting significant misstatements or errors, comprising inherent, control, and detection risks.
The risk that an auditor may issue an incorrect opinion on financial statements due to not detecting material misstatements or errors. It consists of inherent risk, control risk, and detection risk, and effectively managing audit risk is crucial for the credibility of the audit report.
For more information, view this lecture on What is Audit Risk?.
Define:
Audit Sampling
Selecting a representative subset of data for review to provide assurance about data accuracy and reliability without examining every single data point.
The process of selecting a subset of data or transactions for review during an audit. It is used to reduce the amount of information that needs to be examined in order to provide a reasonable assurance of the accuracy and reliability of the data. For example, an auditor may select a random sample of transactions from a company’s sales records to test for accuracy and completeness.
For more information, view this lecture on What is Audit Sampling?.
Define:
Audit Subject Matter Risk
The risk associated with the specific area being audited, affecting the auditor’s ability to obtain accurate and complete information.
The risk related to the specific area or aspect being audited, which may affect the auditor’s ability to obtain accurate and complete information. Factors like the complexity of the subject matter, susceptibility to misstatement or fraud, and changes in the operational environment can influence the level of this risk.
Define:
Audit Trails
The record of steps taken and evidence collected during an audit, documenting the audit process and supporting the auditor’s conclusions and recommendations.
The documentation of the steps taken during an audit, including the evidence gathered and the conclusions reached. It is used to provide a record of the audit process and to support the auditor’s findings and recommendations. For example, an audit trail may include a list of the documents reviewed, the questions asked, and the observations made during the audit.
For more information, view this lecture on Security Audit Logs. Or visit this Wikipedia page.
Define:
Audit Universe
All possible areas within an organization that could be audited, including systems, departments, and processes, guiding audit planning and resource allocation.
This encompasses all the potential areas, functions, processes, or units within an organization that could be subjected to audit. It is a comprehensive list of auditable entities and can include systems, departments, business units, or physical locations, among others. The audit universe serves as the basis for developing the audit plan and deciding where to allocate audit resources.
For more information, view this lecture on Security Audits.
Define:
Auditing
The examination of data, records, and performances within an organization to ensure accuracy, integrity, and compliance with established standards.
The systematic and independent examination of data, statements, records, operations, and performances (financial or otherwise) of an organization for a stated purpose. In the context of systems and networks, it involves the reviewing and checking of system logs, configurations, and data to ensure system integrity, performance, and reliability and to detect any signs of unauthorized access or potential security risks.
For more information, view this lecture on Security Audits. Or visit this Wikipedia page.
Define:
Auditors
Professionals who assess systems and processes for compliance and accuracy.
Auditors are specialists who review and evaluate financial records, IT systems, and internal controls to ensure compliance with relevant regulations. They identify potential discrepancies and vulnerabilities, helping organizations maintain integrity and improve operational efficiency through systematic assessments.
For more information, view this lecture on Mission, Data, System Owners, and Data Custodians. Or visit this Wikipedia page.
Define:
Auditor’s Opinion
The outcome of an audit, expressing the auditor’s assurance level on the audited subject matter, which can be unqualified or qualified based on assessment.
The result of an audit procedure and communicates the auditor’s level of assurance in the subject matter being audited. The opinion generally takes the form of a written statement included in the audit report, and it can be “unqualified” or “qualified” depending on whether the auditor believes the information being reviewed is fairly presented, free of material misstatements, and in compliance with applicable standards or laws.
For more information, view this lecture on Security Audits. Or visit this Wikipedia page.
Define:
Banner Grabbing
Gathering system information by sending requests and analyzing the response banners containing details on running services, used for network reconnaissance.
A technique used to gather information about computer systems on a network by sending requests and analyzing the responses (the banners) that contain details about the services running on the system. It is often an initial step in network reconnaissance for both legitimate purposes, such as network inventory, and malicious intents, like vulnerability assessment for exploitation.
For more information, view this lecture on What is Banner Grabbing?.
Define:
Baseline Reporting
The process of documenting the normal state or performance of a system for future comparative analysis and identifying deviations that may indicate security issues.
The process of documenting the standard state or performance level of a system, typically done for comparative analysis over time. In a security context, this can be valuable for identifying abnormalities or potential threats, as significant deviations from the established baseline may indicate an issue. Such reports could include information on normal network traffic patterns, typical user behavior, and system performance metrics, among others.
For more information, view this lecture on Information Security Governance: Policies, Procedures, Guideline, and Frameworks.
Define:
Batch Control
A method managing tasks processed in groups or “batches,” ensuring data integrity and confidentiality through access controls, audit trails, and error checking.
A method of managing and coordinating tasks that are processed as a group, or “batch”, rather than individually. This approach is common in environments where large amounts of data are processed and strict control is needed over the execution of tasks. In a security context, batch control mechanisms ensure the integrity and confidentiality of data by enforcing appropriate access controls, audit trails, and error checking across the entire batch of tasks.
Define:
Batch Processing
The execution of multiple jobs on a computer without manual intervention, requiring secure handling to maintain the confidentiality and integrity of processed sensitive data.
The execution of a series of jobs on a computer without manual intervention. In cybersecurity, batch processing must be handled securely, ensuring that sensitive data processed in batches maintains confidentiality and integrity and that access to batch processes is appropriately restricted and logged.
For more information, view this lecture on What is Batch Processing?.