Section1 Flashcards

(80 cards)

1
Q

Regulations

A

Legally binding mandates which demands strict adherence to data protection rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GDPR - general data protection regulation

A

Imposes strict rules on data processing and movement within the EU and for businesses or a company dealing with EU citizens data.

Fines up to 4% or 20 million euros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GLBA - Gramm-Leach-Bliley Act

A

Financial service act of 1999

Protect privacy of individuals, financial information held by financial institutions.

Includes encryption, security audits, sec measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HIPAA- health insurance portability and accountability act

A

Fiscal, admin, technical safeguards.

Regulates confidentiality, and security of healthcare information

Encryption, secure access controls and reg audits

Fines: 100$ -50k. Max pen 1.5m per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PCI DSS - payment card, industry, data security standard

A

For credit cards/payments

Secure networks, implementing strong, access control, conducting regular network, monitoring, and testing

5k - 100k per month until fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISO / IEC 27000 series

A

Specifications for implementing maintaining and improving IT security management systems

Mitigate legal risks, build customer trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stakeholder alignment

A

Ensures that everyone understands the objectives, timelines and outcomes of a pen test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of Assessments

A

Network
Wireless
Application
Mobile
Web
Cloud
API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network assessment

A

Network topology
Firewall configs
Security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wireless assessments

A

Simulate attacks on wireless networks to understand security issues and provide recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

App assessments

A

Code audits
Old Dependency audits
App configs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile assessments

A

Check data leaks
Improper session handling
Insecure data storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web assessments

A

Look for SQL injection, cross, side, scription, security misconfiguration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud assessments

A

Check cloud configurations and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

API assessments

A

Check authentication, authorization, data handling practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of agreements

A

NDA
MSI master service agreements
SOW statements of work
TOS terms of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MSA master serv agreement

A

Project scope
Payment details
Confidentiality clauses
Liability issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Statement of work SOW

A

Outline objectives, deliverables, scope of work, timelines, payment schedules, and responsibilities of each party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Legal and ethical considerations overview

A

Authorization letters
Mandatory reporting requirements
Potentials risks to pentester
Establish escalation path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authorization letter

A

Formally grant’s permissions to pentester to conduct a simulated cyber attack against organizations systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Mandatory reporting

A

Dictate how and when findings should be disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Risks to tester

A

1.Conduct thorough risk assessment
2.implement precautionary measures to protect system
3.establish mutual understanding with client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Escalation path

A

Outline chain of command.

Mitigates: operation interference, system, interference, accidental breach of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Rules of engagement overview

A

Exclusions
Test cases
Test window
Goal reprioritization
Business impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Exclusions
Specifically designated areas out of scope and off-limits
26
Test cases
Predefined scenarios to evaluate the security of a system
27
Test window
Time frame to run test
28
Goal reprioritization
Change goals based on findings
29
IP address
Nodes within network or on internet
30
Shared responsibility model
Laid out different rules and responsibilities of stakeholders involved in keeping a hosted environment secure
31
Building model actors
Hosting providers customers penetration testers third party service providers
32
Hosting providers
Secure infrastructure that runs services offered to customers
33
34
Target selection 4.
CIDR ranges Domains IPs URLs
35
CIDR - classless inter-domain Routing
Method used to allocate IP addresses and route Internet
36
Cloud security out of the box from cloud providers
AWS - AWS trusted advisor and AWS inspector Azure - azure security center and azure advisor GCP - cloud security command center and cloud Armo
37
Before cloud pen testing
Notify service provider
38
3rd party shared responsibility
Software vendors External consultants Partners
39
MITRE ATTACK framework - adversarial tactics techniques Who funds?
Funded by the US computer, emergency readiness team, and the US Department of Homeland security.
40
MITRE tailored models
Enterprise Mobile Cloud And different operating systems
41
MITRE categories
Initial access execution, persistence, privilege escalation, defense, evasion
42
Mitre - initial access category
Spear phishing Drive by compromise
43
Spearphishing
Targeted emails with malicious attachment
44
45
CIDR block for 192.168.100.0/24
192.168.100.1 - 192.168.100.254
46
Domains
Human readable addresses
47
48
OWASP ACRONYM
Open Web application security project
49
OWASP general info
Non profit OWASP top 10 - 10 most common vulns
50
OWASP top ten
Broken access control Cryptographic failures Injections Insecure design Sec misconfigurations Outdated components/packages Auth failure Data integrity failure Logging failures SSRF - server-side request forgery
51
Broken access control
Users can access what they shouldn’t be able to
52
Cryptographic failures
Failures related to managing sensitive data securely
53
Injection flaws
SQL, no SQL, command injection
54
MASVS acronym
Mobile application, security verification standard
55
MASVS control groups
MASVS-XXXXX
56
MASVS-STORAGE
Focus on secure storage of sensitive data
57
MASVS-CRYPTO
Cryptographic measures
58
MASVS-AUTH
Ensure strong mechanism to verify user identities and grant appropriate access rate rates
59
MASVS-NETWORK
Security of communication between mobile app and endpoints such as TLS/SSL
60
MASVS-PLATFORM
Focus on how securely app interacts with underlying mobile platform and other apps on same device
61
MASVS-CODE
Secured development of apps code
62
MASVS-RESILIENCE
Ability to withstand and respond to reverse engineering and tampering
63
MASVS-PRIVACY
Implements privacy controls that align with laws and regulations
64
MASVS checklist OWASP
Mobile application, security testing guide (MASTG) MAS Checklist
65
PTES acronym
Penetration testing execution standard
66
PTES - general info
Framework to conduct thorough and effective penetration tests
67
PTES - pre-engagement interactions
First communication and the reason for conducting a penetration test. Time estimation, scoping, additional support, questionnaires, scope, creep, start and end dates, IP ranges and domains, dealing with third parties, acceptable, social engineering, goals, lines of communication, emergency, contact information, rules of engagement, technology in place
68
69
PTES - Information gathering 3
Compliance driven best practice state sponsored Open source intelligence Footprinting - maps network env
70
71
PTES - threat modeling
Understanding business assets and processes that need protection and the threats and they’re capabilities
72
73
CREST defensible penetration test guidelines CDPT - general
Established a standard for conducting penetration tests with a clear structured approach
74
Council of registered ethical security testers (CREST)
An organization of security companies that sets rigorous standards for cyber security services
75
How many companies in CREST
Over 300
76
How to become crest certified?
Extensive audit and accreditation process
77
CREST purpose
Find highly qualified individuals and companies for penetration testing
78
79
80