Soft Skills & Assessment Management Flashcards

1
Q

Benefits of pen testing to the client

A

Gives an outline to prevent risk in a structured and optimal way

Shows a list of vulnerabilities in the target environment and risks associated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

5 pen testing phases

A

Reconnaissance
Scanning
Vulnerability assessment
Exploitation
Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Black Box Format

A

Pen tester doesn’t know anything about the app or environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Grey Box Format

A

Pen tester has some information and possibly given some user access for testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

White Box Format

A

Pen tester has all infrastructure info, possibly even relevant source code.
With source code and static code analysis, the pen tester can use vulnerabilities found to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Computer Misuse Act 1990

A
  1. Unauthorised access to computer material
  2. Unauthorised access with intent to commit or facilitate commission of further offences
  3. Unauthorised acts with intent to impair or with recklessness as to impairing, operation of computer, etc

3ZA. Unauthorised acts causing or creating risk of serious damage

3A. Making, supplying or obtaining articles for use in offence under section 1, 3 or 3ZA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Data Protection Act 2018

A

Everyone responsible for using personal data has to ensure data is:
- used fairly, lawfully and transparently
- used for specified, explicit purposes
- handled in a way that ensures appropriate security, including protection against unlawful or unauthorised processing, access, loss, destruction or damage

  • There is stronger legal protection for more sensitive information such as biometrics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Police and Justice Act 2006

A

Clause 39: Increased penalty etc, for offence of unauthorised access to computer material

Clause 40: Unauthorised acts with intent to impair operation of computer etc

Clause 41: Making, supplying or obtaining articles for use in computer misuse offences

Clause 42: Transitional and saving provision

e.g. DoS is an offence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Human Rights Act 1998

A
  • Your right to respect for private and family life
  • Protection of property
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Understanding, Explaining and Managing Risk

What are some additional risks that pen testing can present?

A
  • Personal data is accessed - Make sure it’s part of the agreed scope. The person reviewing pen test results may not be authorised to view the personal data found
  • Denial of Service conditions - ensure dev team have backups or contingency plans available. if test done on productions, perhaps do pen test at night or when usage is low
  • Remove all payloads you put in. - any config files that changed, change them back. Best to have dev team do reverts
  • Do not use tools you don’t understand - tools found online could be useful, but may contain malware. The tool may function causing unexpected behaviours.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly