Cissp Domain 6
Cissp Domain 6
Vulnerability assessments
use automated tools to search for known vulnerabilities in
systems, applications, and networks.
flaws may include missing patches, misconfigurations, or faulty
code that expose the organization to security risks.
Penetration tests
uses these same tools but supplements them with attack techniques
where an assessor attempts to exploit vulnerabilities and gain access to
the system.
Assessment & testing
Software testing
techniques verify that code functions as designed and does not contain
security flaws.
Code review
uses a peer review process to formally or informally validate code before
deploying it in production.
Interface testing
assesses the interactions between components and users with API testing,
user interface testing, and physical interface testing.
static vs dynamic testing
Log reviews
particularly for administrator activities, ensure that systems are not misused.
Security audits
occur when a third party performs an assessment of the security controls
protecting an organization’s information assets.
Internal audits
are performed by an organization’s internal staff and are intended for
management use.
External audits are performed by a third-party audit firm and are
generally intended for the organization’s governing body.
THANKS
FOR WATCHING!