Domain 6 -- Security Assessment and Testing Flashcards
(105 cards)
What are the 8 steps to the Information System Security Audit Process?
- Determine goals
- Involve the right business unit leaders
- Determine the scope
- Choose the audit team
- Plan the audit
- Conduct the audit
- Document the results
- Communicate the results
What’s the difference between internal audits, external audits and third party audits?
- Internal audits – self evident. An organization audits itself
- External audit (aka second party audit) – an organization audits a business partner (Target and Fazio Mechanical services)
- Third Party audit – Bring in an outside company to conduct the audit
What is a technical control?
It’s a security control implemented through the use of an IT asset.
What are three types of vulnerability testing?
- Personnel testing – people, procedures, training
- Physical tesing – review the facility and perimeter protection
- System and network testing
What’s the difference between Black Box, white box and grey box testing?
- Black box testing - Tester has no a priori knowledge of the internal design or features of the system. All knowledge comes from the testing itself.
- White Box testing — auditor is given complete knowledge of the inner workings of the system before testing begins
- Better for insider threat
- Not as good for outsider threats
- Somewhere between Black and white box testing. The tester has some knowledge, but not all of the inner workings
What is penetration testing?
Penetration testing is the process of simulating attacks on a network and its systems at the request of the owner, senior management.
Pen tests are not restricted to information technology. Could be technical, physical or administrative
What are the capabilities of Vulnerability scanners?
- identify active hosts on the network
- identify active/vulnerable services (ports) on hosts
- identify applications and banner grabbing
- identify operating systems
- identify vulnerabiliites associated with discovered operating systems and apps
- Identify misconfigured settings
- Test for compliance with host applications usage/security policies
- The establishment of a foundation for penetration testing
What is the 5-step process used during penetration testing?
- Discovery – gathering info about target
- Enumeration - performing port scans and resource identification methods
- Vulnerability mapping - identifying vulnerabilities in identified systems and resources
- Exploitation – attempt to gain unauthorized access
- Report to management
What’s the difference between a blind, double blind or targeted pen test?
-
Blind test – assessors only have publicly available data to work with
- network security staff is aware that this type of test will take place
-
Double Blind (aka stealth assessment) – blind to assessors and the security staff is not notified
- Better for evaluting how good the security team is to identifying and responding to an attack
-
Targeted Tests - can be internal and/or external consultants carrying out focused tests on specific areas of interests
- Example is if a new application or web site is being rolled out
What’s the difference between a vulnerability test and a penetration test?
- Vulnerability test has a goal of identifying potential vulnerabilities
- Penetration test has a goal of exploiting one or more vulnerabilities to prove that a hacker actually can gain access to company resources
What is War Dialing?
- War dialing allows attackers and administrators to dial large blocks of phone numbers in search of available modems
What’s a kernel flaw and how do you protect against it?
- kernel flaws are problems that occur below the level of the UI, deep in the OS
- You protect against them by keeping patches up to date (after sufficient testing)
What are buffer overflows and how do you protect against them?
- Good programming practices
- Developer education
- automated source code scanners
- enhanced programming libraries
- strongly typed languages
What’s a symbolic link vulnerability and how do you protect against it?
- The vulnerability is that a program may follow a symbolic link and the attacker may be able to compromise that symbolic link to gain unauthorized access
- Countermeasures:
- Don’t use symbolic links. Use the full path name
What are file descriptor attacks and how do you protect against them?
- File descriptors are numbers many OS’s use to represent open files in a process.
- Certain file descriptors are universal – same to all programs
- If a program makes unsafe use of a file descriptor, an attacker may be ale to insert unexpected input into the program or cause output to go to an unexpected place with the privileges of the executing program
- Countermeasures:
- Good programming practices
- Developer education
- Source code scanners
- Application security testing
What’s a race condition and how do you protect against it?
Race conditions exist when the design of a program puts it in a vulnerable condition before ensuring that those vulnerable conditions are mitigated.
Countermeasures
- Good programming practices
- Developer education
- automated source code scanners
- app security testing
What are file and directory permission vulnerabilities and how do you protect against them?
Many attacks rely on inappropriate file or directory permissions
Countermeasures
- File integrity checkers
- These shoulda lso check expected file and directory permissions
What’s the Postmortem?
After the testing is complete – you should review the results, close gaps where possible and decide priorities moving forward.
What are Log Reviews?
- A log review is the examination of system log files to detect security events or to verify the effectiveness of security controls
- It’s important to have time synchronized in order for log analysis across multiple systems to be meaningful.
What is NTP?
NTP stands for Network Time Protocol
- It’s really important for keeping systems in synch and providing the ability to correlate log entries made by differrent systems
What are ways to prevent log tampering?
- Remote logging – putting log files on a separate box makes the attackers have to compromise that box, too.
-
Simplex Communication – only have a one-way path to the log repository
- You can sever the receive pairs on an Ethernet cable
- known as a data diode
- Replication – replicate log files someplace not on the network (e.g. removable device)
- Write Once Media
- Crytographic hash chaining – each event is appended to the cryptographic hash – ensures completeness and integrity of every event in the chain
What does SIEM stand for and how is it used?
- SIEM stands for Security Information and Event Manager
- They are systems that enable:
- Centralization
- Correlation
- Analysis
- Retention of event data
- Purpose is to generate automated alerts
- Typically, they provide a dashboard
What is a synthetic transaction and how are they useful in security?
- A synthetic transaction is a transaction that is generated by a script
- They allow us to systematically test the behavior and performance of citical services.
What’s the difference between real user monitoring and synthetic Transactions?
- Real User Monitoring is a passive way to monitor the interactions of real users with a web application system
- It uses agents to capture metrics such as delay, jitter and errors from a user’s perspective
- Can require more backend analysis to understand when a user may have changed his mind or lost mobile connectivity, rather than something to be concerned about
- Synthetic transactions are more consistent.
- Neither is better all the time