Information Technology /Security+ (SY0-701): Lesson 15: Risk Management Part 4

Security+ (SY0-701): Lesson 15: Risk Management Part 4

Information Technology21 CardsCreated about 2 months ago

This deck covers key concepts from Lesson 15 of Security+ (SY0-701), focusing on risk management, including statements of work, rules of engagement, audits, reconnaissance, and penetration testing.

Define a 'Statement of Work (SOW)/Work Order (WO)'

Details a vendor project or engagement's scope, deliverables, timelines, and responsibilities.
Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/21

Key Terms

Term
Definition
Define a 'Statement of Work (SOW)/Work Order (WO)'
Details a vendor project or engagement's scope, deliverables, timelines, and responsibilities.
Define 'Rules of Engagement (RoE)'
Rules defining what vendors must adhere to.
What are important elements of a Rules of Engagement (RoE)?
Roles and Responsibilities; Security Requirements; Compliance Obligations; Reporting and Communication; Change Management; Contractual Provisions (lia...
Define an 'attestation'
Formal declaration that an organization's security controls and practices comply with specific standards, regulations, or best practices.
What is the purpose of an attestation?
Provides assurance to stakeholders that an organization's security measures are adequate.
What is the function of internal audits?
To enable continuous monitoring, early detection of issues, and timely remediation.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Define a 'Statement of Work (SOW)/Work Order (WO)'
Details a vendor project or engagement's scope, deliverables, timelines, and responsibilities.
Define 'Rules of Engagement (RoE)'
Rules defining what vendors must adhere to.
What are important elements of a Rules of Engagement (RoE)?
Roles and Responsibilities; Security Requirements; Compliance Obligations; Reporting and Communication; Change Management; Contractual Provisions (liability, insurance, and termination).
Define an 'attestation'
Formal declaration that an organization's security controls and practices comply with specific standards, regulations, or best practices.
What is the purpose of an attestation?
Provides assurance to stakeholders that an organization's security measures are adequate.
What is the function of internal audits?
To enable continuous monitoring, early detection of issues, and timely remediation.
What is the function of external audits?
To validate the organization's controls, compliance, and risk mitigation efforts.
What are likely procedures in a pen test?
Verify a Threat Exists; Bypass Security Controls; Actively Test Security Controls; Exploit Vulnerabilities.
Define 'Active reconnaissance'
Penetration testing techniques involving actively probing and interacting with target systems and networks to gather information.
What are forms of active reconnaissance?
Port scanning; service enumeration; OS fingerprinting; DNS enumeration; Web application crawling.
Define 'Service enumeration'
Interacting with identified services to gather information about their versions, configurations, and potential vulnerabilities.
Define 'DNS enumeration'
Gathering information about the target's DNS infrastructure, such as domain names, subdomains, and IP addresses.
Define 'web application crawling'
Exploring web applications to identify pages, directories, and potential vulnerabilities.
Define 'passive reconnaissance'
Gathering information about target systems and networks without directly interacting with them by focusing on collecting publicly available data and passively observing network traffic.
What are forms of passive reconnaissance?
Open-Source Intelligence (OSINT) Gathering; Network Traffic Analysis; Social Engineering.
Define 'Open-Source Intelligence (OSINT) Gathering'
Collecting publicly available information from various sources like search engines, social media, public databases, and websites.
Define 'Offensive penetration testing/red team'
Identify vulnerabilities, weaknesses, and potential attack vectors that malicious actors could exploit.
Define 'Defensive penetration testing/blue team'
Evaluates an organization's defensive security measures, detection capabilities, incident response procedures, and overall resilience against cyber threats.
Define 'Physical penetration testing'
Assessments of an organization's physical security practices and controls by simulating real-world attack scenarios to identify vulnerabilities and weaknesses in physical security systems.
What is the point of the string '../../../../../../' used in an injection attack?
To use directory traversal to reach the root directory.
Injecting a web shell can be accomplished by taking advantage of what discovered vulnerability?
File upload.