SlideShare a Scribd company logo
CNIT 125:
Information Security
Professional
(CISSP
Preparation)
Ch 7. Security Assessment
and Testing
Assessing Access Control
Penetration Testing
• Authorized white hat hacker breaks into
an organization
Social Engineering
• Exploiting the human mind
• Often tricks the user into clicking a link
• Zero-knowledge (black box) test
• No information provided to attacker
• Full-knowledge test
• Provides pen tester with network diagram,
policies and procedures, and sometimes
results from previous pen testers
• Partial-knowledge test
Penetration Tester Tools and
Methodology
• Metasploit (open source)
• Core Impact and Immunity Canvas
(closed source)
• Methodology
Assuring Confidentiality, Data Integrity,
and System Integrity
• Pen testers must ensure confidentiality
of data they access
• Report should be treated as confidential
Vulnerability Testing
• Also called Vulnerability Scanning
• Uses a tool like Nessus or OpenVAS
• Finds vulnerabilities
• Requires manual verification and
assessment
• Must be matched to real threats to find
true risk
Security Audit
• Tests against a public standard
• Such as PCI-DSS (Payment Card Industry
Data Security Standard)
Security Assessment
• View many controls across multiple
domains
• Policies and procedures
• Administrative controls
• Change management
• Other tests (pen tests, vuln
assessments, security audits)
Internal and Third Party Audits
• Internal audits
• Assessing adherence to policy
• External audits
• Require security professionals to play
a role
• Response and remediation to audit
findings
• Demonstrating mitigations
Log Reviews
• Easiest way to verify that access control
mechanisms are working
Centralized Logging
• A central repository allows for more
scalable security monitoring and
intrusion detection
• Syslog transmits log data in plaintext
over UDP port 514
• Log retention
• May be relevant to legal or regulatory
compliance
Software Testing Methods
Software Testing Methoda
• Discovering programmer errors
• Custom apps don't have a vendor
providing security patches
• Source code review helps
• Two general approaches:
• Static and dynamic analysis
• Also manual code review
• Pair programming is employed in agile
programming shops
Static and Dynamic Testing
• Static testing: the code is not running
• Review source code for insecure
practices, unsafe functions, etc.
• Unix program lint
• Compiler warnings
• Dynamic testing: while code is executing
• White box testing: tester has source
code
• Black box: tester has no internal details
Traceability Matrix
• Maps customer requirements to software
testing plan
Synthetic Transactions
• Simulating business activities
• Often used for Web apps
Software Testing Levels
• Unit testing
• Tests components like functions,
procedures, or objects
• Installation testing
• Tests software as it is installed and first
operated
• Integration Testing
• Testing multiple software components as
they are combined into a working system
Software Testing Levels
• Regression testing
• Testing softare after updates,
modification, or patches
• Acceptance testing
• Testing to ensure the software meets
the customer's requirements
• When done by customer, called User
Acceptance Testing
Fuzzing
• A type of black box testing
• Sends random malformed data into
software programs
• To find crashes
• A type of dynamic testing
• Has found many flaws
Combinatorial Software Testing
• Seeks to identify and test all unique
combinations of software inputs
• Pairwise testing (also called all pairs
testing)
Misuse Case Testing
• Formally model an adversary misusing
the application
• A more formal and commonly recognized
way to consider negative security
outcomes is threat modeling
• Microsoft highlights it in their Security
Development Lifecycle (SDL)
Test Coverage Analysis
• Identifies the degree to which code
testing applies to the entire application
• To ensure that there are no significant
gaps
Analyze and Report Test Outputs
• Security test results are easy to produce
• Actually improving security is much
more difficult
• Data must be analyzed to determine what
action to take

More Related Content

PPTX
Threat Hunting - Moving from the ad hoc to the formal
PPTX
CISSP - Security Assessment
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPT
Info Security - Vulnerability Assessment
PPTX
Chapter 5 - Identity Management
PDF
Nessus Software
PDF
Network Architecture Review Checklist
PPTX
INFORMATION SECURITY
Threat Hunting - Moving from the ad hoc to the formal
CISSP - Security Assessment
VAPT - Vulnerability Assessment & Penetration Testing
Info Security - Vulnerability Assessment
Chapter 5 - Identity Management
Nessus Software
Network Architecture Review Checklist
INFORMATION SECURITY

What's hot (20)

PDF
How to Hunt for Lateral Movement on Your Network
PDF
Secure Coding - Web Application Security Vulnerabilities and Best Practices
PPTX
Vulnerability assessment and penetration testing
PPTX
Chapter 1 Security Framework
PPTX
OpenVAS
PPTX
IBM Security QRadar
PPTX
CISSP - Software Development Security
PPTX
What is Penetration Testing?
PDF
Vulnerability and Patch Management
PDF
Cyber security and demonstration of security tools
PPT
Malware Analysis Made Simple
PPT
Application Security
PDF
Threat Modeling Using STRIDE
PDF
Data Privacy & Security
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PPTX
Security testing
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PPTX
System hardening - OS and Application
DOCX
Requirement for creating a Penetration Testing Lab
PPTX
Basic Dynamic Analysis of Malware
How to Hunt for Lateral Movement on Your Network
Secure Coding - Web Application Security Vulnerabilities and Best Practices
Vulnerability assessment and penetration testing
Chapter 1 Security Framework
OpenVAS
IBM Security QRadar
CISSP - Software Development Security
What is Penetration Testing?
Vulnerability and Patch Management
Cyber security and demonstration of security tools
Malware Analysis Made Simple
Application Security
Threat Modeling Using STRIDE
Data Privacy & Security
INCIDENT RESPONSE NIST IMPLEMENTATION
Security testing
Ethical Hacking n VAPT presentation by Suvrat jain
System hardening - OS and Application
Requirement for creating a Penetration Testing Lab
Basic Dynamic Analysis of Malware
Ad

Viewers also liked (20)

PDF
CISSP Prep: Ch 4. Security Engineering (Part 1)
PDF
CISSP Prep: Ch 3. Asset Security
PDF
CISSP Prep: Ch 9. Software Development Security
PDF
CISSP Prep: Ch 6. Identity and Access Management
PDF
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PDF
CISSP Prep: Ch 8. Security Operations
PDF
CISSP Prep: Ch 4. Security Engineering (Part 2)
PDF
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
PDF
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
PPTX
CISSP Certification-Asset Security
PDF
CNIT 127: Ch 8: Windows overflows (Part 2)
PDF
CNIT 140: Perimeter Security
PDF
CNIT 123: Ch 1 Ethical Hacking Overview
PDF
CNIT 126 5: IDA Pro
PDF
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
PPTX
Cissp- Security and Risk Management
PDF
Slide Deck CISSP Class Session 6
PDF
Slide Deck - CISSP Mentor Program Class Session 1
PPT
4.Security Assessment And Testing
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Certification-Asset Security
CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 140: Perimeter Security
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 126 5: IDA Pro
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
Cissp- Security and Risk Management
Slide Deck CISSP Class Session 6
Slide Deck - CISSP Mentor Program Class Session 1
4.Security Assessment And Testing
Ad

Similar to CISSP Prep: Ch 7. Security Assessment and Testing (20)

PPT
testing strategies and tactics
PDF
AppSec in an Agile World
PDF
penetration testing
PDF
SQA_Unit 3.pdf it is a database education
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PPTX
Manual Testing Types Used in Software Testing
PPTX
Software Engg - Wk 11 - Lec 12 - Software_Testing Part-1.pptx
PDF
Top Security Challenges Facing Credit Unions Today
PPT
Software testing-and-analysis
PPT
System Testing by system analysis design.ppt
PPTX
Software testing
PPT
Software Quality
PPTX
What is penetration testing
PDF
Software testing methods, levels and types
PPTX
Security testing
PDF
Pm 6 testing
PDF
Pm 6 testing
PPTX
SENG202-v-and-v-modeling_121810.pptx
PPTX
Software Quality Assurance
PDF
manualtesting-170218090020 (1).pdf
testing strategies and tactics
AppSec in an Agile World
penetration testing
SQA_Unit 3.pdf it is a database education
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Manual Testing Types Used in Software Testing
Software Engg - Wk 11 - Lec 12 - Software_Testing Part-1.pptx
Top Security Challenges Facing Credit Unions Today
Software testing-and-analysis
System Testing by system analysis design.ppt
Software testing
Software Quality
What is penetration testing
Software testing methods, levels and types
Security testing
Pm 6 testing
Pm 6 testing
SENG202-v-and-v-modeling_121810.pptx
Software Quality Assurance
manualtesting-170218090020 (1).pdf

More from Sam Bowne (20)

PDF
Introduction to the Class & CISSP Certification
PDF
Cyberwar
PDF
3: DNS vulnerabilities
PDF
8. Software Development Security
PDF
4 Mapping the Application
PDF
3. Attacking iOS Applications (Part 2)
PDF
12 Elliptic Curves
PDF
11. Diffie-Hellman
PDF
2a Analyzing iOS Apps Part 1
PDF
9 Writing Secure Android Applications
PDF
12 Investigating Windows Systems (Part 2 of 3)
PDF
10 RSA
PDF
12 Investigating Windows Systems (Part 1 of 3
PDF
9. Hard Problems
PDF
8 Android Implementation Issues (Part 1)
PDF
11 Analysis Methodology
PDF
8. Authenticated Encryption
PDF
7. Attacking Android Applications (Part 2)
PDF
7. Attacking Android Applications (Part 1)
PDF
5. Stream Ciphers
Introduction to the Class & CISSP Certification
Cyberwar
3: DNS vulnerabilities
8. Software Development Security
4 Mapping the Application
3. Attacking iOS Applications (Part 2)
12 Elliptic Curves
11. Diffie-Hellman
2a Analyzing iOS Apps Part 1
9 Writing Secure Android Applications
12 Investigating Windows Systems (Part 2 of 3)
10 RSA
12 Investigating Windows Systems (Part 1 of 3
9. Hard Problems
8 Android Implementation Issues (Part 1)
11 Analysis Methodology
8. Authenticated Encryption
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 1)
5. Stream Ciphers

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
01-Introduction-to-Information-Management.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Business Ethics Teaching Materials for college
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Institutional Correction lecture only . . .
PPTX
Pharma ospi slides which help in ospi learning
PDF
Pre independence Education in Inndia.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Week 4 Term 3 Study Techniques revisited.pptx
VCE English Exam - Section C Student Revision Booklet
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
01-Introduction-to-Information-Management.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
O5-L3 Freight Transport Ops (International) V1.pdf
Basic Mud Logging Guide for educational purpose
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
2.FourierTransform-ShortQuestionswithAnswers.pdf
Business Ethics Teaching Materials for college
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Institutional Correction lecture only . . .
Pharma ospi slides which help in ospi learning
Pre independence Education in Inndia.pdf

CISSP Prep: Ch 7. Security Assessment and Testing

  • 3. Penetration Testing • Authorized white hat hacker breaks into an organization
  • 4. Social Engineering • Exploiting the human mind • Often tricks the user into clicking a link • Zero-knowledge (black box) test • No information provided to attacker • Full-knowledge test • Provides pen tester with network diagram, policies and procedures, and sometimes results from previous pen testers • Partial-knowledge test
  • 5. Penetration Tester Tools and Methodology • Metasploit (open source) • Core Impact and Immunity Canvas (closed source) • Methodology
  • 6. Assuring Confidentiality, Data Integrity, and System Integrity • Pen testers must ensure confidentiality of data they access • Report should be treated as confidential
  • 7. Vulnerability Testing • Also called Vulnerability Scanning • Uses a tool like Nessus or OpenVAS • Finds vulnerabilities • Requires manual verification and assessment • Must be matched to real threats to find true risk
  • 8. Security Audit • Tests against a public standard • Such as PCI-DSS (Payment Card Industry Data Security Standard)
  • 9. Security Assessment • View many controls across multiple domains • Policies and procedures • Administrative controls • Change management • Other tests (pen tests, vuln assessments, security audits)
  • 10. Internal and Third Party Audits • Internal audits • Assessing adherence to policy • External audits • Require security professionals to play a role • Response and remediation to audit findings • Demonstrating mitigations
  • 11. Log Reviews • Easiest way to verify that access control mechanisms are working
  • 12. Centralized Logging • A central repository allows for more scalable security monitoring and intrusion detection • Syslog transmits log data in plaintext over UDP port 514 • Log retention • May be relevant to legal or regulatory compliance
  • 14. Software Testing Methoda • Discovering programmer errors • Custom apps don't have a vendor providing security patches • Source code review helps • Two general approaches: • Static and dynamic analysis • Also manual code review • Pair programming is employed in agile programming shops
  • 15. Static and Dynamic Testing • Static testing: the code is not running • Review source code for insecure practices, unsafe functions, etc. • Unix program lint • Compiler warnings • Dynamic testing: while code is executing • White box testing: tester has source code • Black box: tester has no internal details
  • 16. Traceability Matrix • Maps customer requirements to software testing plan
  • 17. Synthetic Transactions • Simulating business activities • Often used for Web apps
  • 18. Software Testing Levels • Unit testing • Tests components like functions, procedures, or objects • Installation testing • Tests software as it is installed and first operated • Integration Testing • Testing multiple software components as they are combined into a working system
  • 19. Software Testing Levels • Regression testing • Testing softare after updates, modification, or patches • Acceptance testing • Testing to ensure the software meets the customer's requirements • When done by customer, called User Acceptance Testing
  • 20. Fuzzing • A type of black box testing • Sends random malformed data into software programs • To find crashes • A type of dynamic testing • Has found many flaws
  • 21. Combinatorial Software Testing • Seeks to identify and test all unique combinations of software inputs • Pairwise testing (also called all pairs testing)
  • 22. Misuse Case Testing • Formally model an adversary misusing the application • A more formal and commonly recognized way to consider negative security outcomes is threat modeling • Microsoft highlights it in their Security Development Lifecycle (SDL)
  • 23. Test Coverage Analysis • Identifies the degree to which code testing applies to the entire application • To ensure that there are no significant gaps
  • 24. Analyze and Report Test Outputs • Security test results are easy to produce • Actually improving security is much more difficult • Data must be analyzed to determine what action to take