Premium Partner

Cyber Security Attack & Defense

CSAD

CSAD


Kartei Details

Karten 34
Lernende 10
Sprache English
Kategorie Informatik
Stufe Andere
Erstellt / Aktualisiert 20.02.2018 / 14.06.2023
Lizenzierung Kein Urheberrechtsschutz (CC0)    (caaac)
Weblink
https://card2brain.ch/box/20180220_cyber_security_attack_defense
Einbinden
<iframe src="https://card2brain.ch/box/20180220_cyber_security_attack_defense/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

Give a reason why penetration test methologies are needed.

- Improve chances of successfully completing penetration testing method

List and briefly describe the five process groups in the Project Management Book of Knowledge (PMBOK)

–Initiating (gain approval for project, let client know whats included/excluded, identify stakeholders)
–Planning (duration of project, size of team, cost of project, resources needed)
–Executing (attacks are conducted)
–Closing (final documents released to client, contractual agreement concluded, closing process)
–Monitoring and Controlling (watch out for changes that need to be managed)

Why discuss the PMBOK, when the PMBOK has nothing to do with penetration testing?

As penetration testing is a project itself, the standardized project management practices of PMBOK are of great help when performing pen testing.

State and briefly describe the three phases in Information System Security Assessment Framework (ISSAF)

Phase 1: Planning & Preperation (exchange information, plan and prepare for the test)

Phase 2: Apply layers to the following targets: Networks, Hosts, Applications, Databases.

Phase 3: Generating reports and securing data that was obtained during the test.

List the advantages and disadvantages of using ISSAF in penetration testing

•Advantages
–Does not assume previous knowledge.
–Provides examples of penetration test tool use.


•Disadvantages
–Out of date quickly.
–Penetration test tool examples are not extensive.
–Last update: May 2006

List and briefly describe the six common test types for Open Source Security Testing Methodology Manual (OSSTMM)

Blind: Analyst no knowlede of defenses, assets or channels. Target is prepared.

Double Blind: Analyst no knowledge of defenses, assets or channels. Target is not notified in advance.

Grey Box: Analyst limited knowledge of defenses and assets, full knowledge of channels. Target is prepared

Double Grey Box: Analyst limited knowledge of defenses and assets, full knowledge of channels. Target is notified about scope and time frame, but not channels and vectors.

Tandem: Analyst and Target both prepaired knowing all the details.

Reversal: Analyst full knowledge. Target no knowledge.

List and briefly describe the six error types in OSSTMM

False Positive:

Taret response indicates state as true, but in reality is not true.

False Negative:

Target response indicates state as no true, but in reality is true.

Gray Positive:

Target response indicates state as true, however target is designed to always respond with this state.

Gray Negative:

Target response indicates state as not true, however target is designed to always respond with this state.

Specter:

Target response indicates state as true or not true, but in reality it cannot be known.

Indiscretion:

Target response indicates state as true or false but only during particular time.

Entropy Error:

Target response cannot indicate state as true or false due to a high noise to signal ratio.

Falsification:

Target response indicates state as either true or false although in reality it is dependent on largely unknown variables.

List the advantages and disadvantages of using OSSTMM in penetration testing.

•Advantages
–More flexibility for Pentesters.
–Frequent updates.
•Disadvantages
–Assumes tester have necessary knowledge beforehand.
–Latest version requires paid subscription.