Mod 4 Flashcards
(62 cards)
What does it mean to say, “security is an emergent property”?
That it must be designed into the system from the beginning
Are security tests similar to functional tests?
No. Security tests exists to break things, not repair
Can security testing be done for the whole system?
No, risk assesment must be performed to determine what is worth protecting.
Define attack pattern
Common set of methods to attack systems in a more abstract form.
(The method used to do an attack)
Define attack surface
“Where” the external user has access to the system
What software life cycle level are bugs found?
Implementation
What software life cycle level are flaws found?
Design
What are the 3 tasks of a Security Software Engineer?
Create security test plans using static analysis tools
Performing security tests
Performing penetration tests
Where in the software development lifecycle do security testing, penetration testing, and security operations take place?
Between the Testing and Maintenance phases
What’s the most efficient type of standard software testing?
Whitebox
How does security testing differ from penetration testing?
It’s whitebox (meaning source code is available)
Uses risk analysis to build tests
Measures security against risk model
Define penetration testing
Testing software in deployed environment by attacking it
Define fuzz testing
A testing methodology in which well formed inputs are randomly changed and used for testing
When is fuzz testing useful?
When there is no obvious way to divide your input into equivalence classes.
If no faults are found during a penetration test, does that mean there are not faults in the system?
Not necessarily. It just means there were no faults under the specific conditions of that test.
What are the 4 macro steps of penetration testing?
Plan
Discover
Attack
Report
What are the 5 micro steps of penetration testing?
Target acquisition
Inventory
Probe
Penetrate
Host-based assessment
When does vulnerability scanning come into penetration testing?
Micro steps 1-3, though most would just say step 3
What are the 4 categories of penetration tests?
Network
Host
Distributed apps
Local apps
What are the tools used in network penetration testing? (3)
nmap,
ncat,
wireshark
Define static analysis
analyzing the code without running it
What’s the most common tool for static analysis?
compilers
Is it good to use different compilers for static analysis?
Yes because different compilers can give different messages.
What types of errors are NOT detected by compilers?
syntax