Skip to content

Latest commit

 

History

History
56 lines (46 loc) · 3.19 KB

File metadata and controls

56 lines (46 loc) · 3.19 KB

Logo

Domain 6 - Security Assessent and Testing

Elevator Pitch

So, how do you know you're protecting your organization? What do you do to measure your success? This domain describes various methods, techniques, and the process of assessing security

Standards

  • NIST 800-53A: Building Effective Assessment Plans
  • NIST 800-137: Information Security Continuous Monitoring (ISCM)
  • NIST 800-115: Technical Guide to Information Security Testing and Assessment

Software Testing Levels

  • Unit Testing: Low-level test of software components, such as functions, procedures, or objects.
  • Installation Testing: Testing software as its install and first operated
  • Integration testing: Testing multiple software components as they're combined intoa working system.
  • Regression Testing: Testing software after updates, modifications, or patches
  • Acceptance Testing: Testing to ensure the software meets the customers operational requirements. Referred to as user Acceptance testing, when done by the customer.
  • Fuzzing: Used in black-box testing. Sending ramdom malformed data as inputs into programs to determine if they will crash. One of the first steps of discovering Buffer Overflow

Penetration Testing

  • Planning
  • Reconnaissance
  • Scanning
  • Vulnerability Assessment
  • Exploittation
  • Reporting:

Penetration Testing Stages

STRIDE: A Microsoft threat categorization scheme

  • Spoofing: Impersonating someone or something
  • Tampering: Modifying data or code
  • Repudiation: Claiming to have not performed an action
  • Information Disclosure: Exposing information to someone unauthorized
  • Denial of Service: Deny or degrade service to users
  • Elevation of Prilege: Gain capabilites without being authorized

Penetration Testing Methods

  • Black Box: Very little known about the target. Assume the tester has zero knowledge of the target in question
  • Gray Box: Some knowledge of the target. Assume the tester
  • White Box: Assume the tester has full access/knowlege of the target. Pentesting Methods

Useful Links