Domain 6: Security Assessment and Testing Flashcards
Define security testing
Verifies that a control is functioning properly. These tests include automated scans, tool-assisted penetration tests and manual attempts to undermine security.
Verification
Objective evidence that the design outputs of a phase of the SDLC meet requirements. This may be performed by a third party entity.
Validation
Develop a “level of confidence” that the software meets all requirements and expectations, software improve over time.
Network flow - Logging
Captured to provide insight into network traffic for security, troubleshooting, and performance management.
Audit logging (network)
Provides information about events that have occurred, on routers/other network devices.
NTP
Network Time Protocol.
Why is accurate time important for an environment?
Logs must have accurate time stamps that these time stamps remain consistent throughout the environment. A common method is to set up an internal NTP server that is synchronised to a trusted time source such as a public NTP server. Other systems can then sychronise with this internal NTP server.
Syslog
Message logging standard commonly used by network devices, Linux and Unix systems and other devices (firewalls).
Modified logs are a sign of…
Intrusion or malicious intent.
War driving
Driving a car with a laptop to find open AP’s
IDS
Intrusion Detection Systems.
What are the two types of IDS
- Network Based
2. Host Based
Network Based IDS
Detects intrusions on the LAN behind a firewall. It is a passive device while it acquires data and reviews packets and headers. However, the issue with NIDS is that it will not detect attacks by users logged into hosts.
Host based IDS
Monitors servers through Event and System logs. However, it is only as good as the host logging created. However, it can be easier to discover and disable.
Signature based method (AKA Knowledge based)
Attacks are compared with signature attack database
Statistical anomaly based
Defines a normal behavior and detects abnormal behaviors
Response Box
Is a part of an IDS that initiates an alarm or activity
Response Box Components
Information source/sensor, centralised monitor software, data and event report analysis, database components and response to an event or intrusion
IPS Intrusion Prevention System
Detect attack and PREVENT that attack from being successful
Remote Acces Software
Granted and secured through VPNs
Web Proxies
Form of gateway that provides clients with a filtering, caching, or other service that protects their information from remote systems.
Vulnerability Management System
Such as Nessus, used to enable effective patch management strategy
Authentication Servers
System that facilitates authentication of an entity, such as SSO servers
Routers
Opens up data packet, reads hardware or network address and then forwards it to the correct network.