0% found this document useful (0 votes)
1 views

3

The document outlines various methods and tools for security assessment and testing, including automated scans, manual attempts, and vulnerability assessments. It details the processes for penetration testing, compliance checks, and the use of specific tools and methodologies. Additionally, it emphasizes the importance of regular audits and risk assessments to ensure effective security controls are in place.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

3

The document outlines various methods and tools for security assessment and testing, including automated scans, manual attempts, and vulnerability assessments. It details the processes for penetration testing, compliance checks, and the use of specific tools and methodologies. Additionally, it emphasizes the importance of regular audits and risk assessments to ensure effective security controls are in place.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Security

Assessment and
Testing
Regular checks ensure adequate security controls are in place and
effective.
Security Tests
1 Automated Scans
Run regularly to check for vulnerabilities

2 Tool-Assisted Tests
Use specialized tools to probe security

3 Manual Attempts
Try to undermine security controls
Security Assessments
Risk Assessment Recommendations
Identify vulnerabilities that Suggest remediation steps
may allow compromise as needed

Management Report
Summarize results in non-technical language
Security Audits
Internal Audits External Audits Third-Party Audits

Performed by internal staff for Performed by outside firm for Conducted on behalf of another
internal use external validity organization
Vulnerability Assessments
1 Network Discovery 2 Network
Scans Vulnerability Scans
Identify systems and Probe for known
open ports vulnerabilities

3 Web Application 4 Database Scans


Scans
Check databases for
Test web apps for security security issues
flaws
Network Discovery Scanning

TCP SYN Scanning


Send SYN packet to check for open ports

TCP Connect Scanning


Open full connection to remote system

TCP ACK Scanning


Send ACK packet to test firewall rules
Nmap Scanning Tool
Open Port accepting connections

Closed Port accessible but no


application listening

Filtered Firewall blocking access to


port
Network Vulnerability Scanning

Probe Systems Check Database Generate Report


Test for known vulnerabilities Compare against vulnerability Summarize findings and
database recommendations
Authenticated vs Unauthenticated Scans
Unauthenticated Authenticated

Test from external attacker perspective Use system access to improve accuracy
Web Vulnerability
Scanning
1 SQL Injection 2 Cross-Site Scripting
Test for database query Check for malicious script
manipulation injection

3 Input Validation
Verify proper handling of user inputs
Database Vulnerability
Scanning

Direct Database Scans


Test database security configurations

Web Application Scans


Check for database vulnerabilities via web apps

Access Control Tests


Verify proper database access restrictions
Vulnerability Management
Workflow
Detection
Identify vulnerabilities through scanning

Validation
Confirm vulnerabilities are not false positives

Remediation
Apply patches or implement workarounds
Penetration Testing
1 Planning
Agree on scope and rules of engagement

2 Discovery
Gather information about target environment

3 Attack
Attempt to exploit vulnerabilities

4 Reporting
Summarize results and recommend improvements
Types of Penetration Tests
White-Box Gray-Box Black-Box

Testers given detailed system Testers given partial system Testers given no prior information
information knowledge
Penetration Testing Tools

Metasploit Framework
Automate common exploit techniques

Web Application Scanners


Test web apps for vulnerabilities

Password Crackers
Attempt to break weak passwords
Breach and Attack
Simulations
Automated Testing Continuous
Assessment
Simulate attacks to test
security controls Regularly evaluate security
posture

Control Validation
Verify effectiveness of security measures
Compliance Checks
1 Regulatory 2 Industry Standards
Requirements
Ensure compliance with
Verify adherence to best practices
relevant laws

3 Internal Policies
Confirm alignment with company guidelines
Security Content Automation
Protocol (SCAP)

CVE
Common Vulnerabilities and Exposures naming system

CVSS
Common Vulnerability Scoring System

CCE
Common Configuration Enumeration
Service Organization
Controls (SOC) Audits
SOC 1 Financial reporting controls

SOC 2 Security, availability,


processing integrity controls

SOC 3 Public disclosure of SOC 2


results
Auditing Standards
COBIT ISO 27001 ISO 27002

Control Objectives for Information Information security management Code of practice for information
and Related Technologies system standard security controls
Penetration Testing
Methodologies
1 OWASP Testing 2 OSSTMM
Guide
Open Source Security
Web application security Testing Methodology
testing Manual

3 NIST 800-115
Technical Guide to Information Security Testing

You might also like