CASP/1.0 Enterprise Security 40%

From Wikibooks, open books for an open world
Jump to navigation Jump to search

Distinguish which cryptographic tools and techniques are appropriate for a given situation.

[edit | edit source]

Issuance to entities

[edit | edit source]

"RFC 2510 PKI Certificate Management Protocols". Retrieved 12MAY2014. {{cite web}}: Check date values in: |accessdate= (help)

Users
[edit | edit source]

"CERT issued certificate". Retrieved 15MAY2014. {{cite web}}: Check date values in: |accessdate= (help)

Systems
[edit | edit source]

Muller, Randy (August 2006). "How IT Works: Certificate Services". TechNet Magazine. 2006 (August). Retrieved 2021-10-22.

Applications
[edit | edit source]

Implications of cryptographic methods and design

[edit | edit source]

Strength vs. performance vs. feasibility to implement vs. interoperability

[edit | edit source]

"Understanding Cryptographic Performance" (PDF). Retrieved 15MAY2014. {{cite web}}: Check date values in: |accessdate= (help) "Elliptic Curve". Retrieved 15MAY2014. {{cite web}}: Check date values in: |accessdate= (help)

Distinguish and select among different types of virtualized, distributed and shared computing

[edit | edit source]

Advantages and disadvantages of virtualizing servers and minimizing physical space requirements

[edit | edit source]

"Example of minimizing physical server space". Retrieved 22MAY2014. {{cite web}}: Check date values in: |accessdate= (help)

Securing virtual environments, appliances and equipment

[edit | edit source]

"Virtual Environment Security". Retrieved 22MAY2014. {{cite web}}: Check date values in: |accessdate= (help)

Vulnerabilities associated with a single physical server hosting multiple companies’ virtual machines

[edit | edit source]

Vulnerabilities associated with a single platform hosting multiple companies’ virtual machines

[edit | edit source]

Secure use of on-demand / elastic cloud computing

[edit | edit source]

Provisioning and De-provisioning

[edit | edit source]

Vulnerabilities associated with co-mingling of hosts with different security requirements

[edit | edit source]

Explain the security implications of enterprise storage

[edit | edit source]

Integrate hosts, networks, infrastructures, applications and storage into secure comprehensive solutions

[edit | edit source]

"Integrating Application Delivery Solutions into Data Center Infrastructure". Retrieved 28MAY2014. {{cite web}}: Check date values in: |accessdate= (help)

Complex network, Network security, solutions for data flow

[edit | edit source]

"Network Security Solutions". {{cite web}}: Text "accessdate2014JUN02" ignored (help) "High Performance Network Security, Enterprise and Data-Center Firewall". Retrieved 2014JUN02. {{cite web}}: Check date values in: |accessdate= (help)

Secure data flows to meet changing business needs

[edit | edit source]

"Network Security". Retrieved 2014JUN02. {{cite web}}: Check date values in: |accessdate= (help)

Logical deployment diagram and corresponding physical deployment diagram of all relevant devices

[edit | edit source]

Distinguish among security controls for hosts

[edit | edit source]

"Host Based Security Controls". {{cite web}}: Text "accessdate2014JUN03" ignored (help)

Host-based firewalls

[edit | edit source]

Trusted OS – Operating System (e.g. how and when to use it)

[edit | edit source]

Warning banners

[edit | edit source]

"System/Network Login Banners". {{cite web}}: Text "accessdate2014JUN03" ignored (help)

Restricted interfaces

[edit | edit source]

"The Benefit of Structured Interfaces in Collaborative Communication" (PDF). Retrieved 2014JUN03. {{cite web}}: Check date values in: |accessdate= (help)

Asset management (inventory control)

[edit | edit source]

Data exfiltration

[edit | edit source]

Explain the importance of application security

[edit | edit source]

Web application security design considerations

[edit | edit source]

"Design Guidelines for Secure Web Applications". Retrieved 2014JUN16. {{cite web}}: Check date values in: |accessdate= (help)

Secure: by design, by default, by deployment

[edit | edit source]

"A Look Inside the Security Development Lifecycle at Microsoft". Retrieved 2014JUN16. {{cite web}}: Check date values in: |accessdate= (help)

Specific application issues

[edit | edit source]

Industry accepted approaches

[edit | edit source]

Secure coding standards

[edit | edit source]

"Secure Coding Standards". Retrieved 2014JUN25. {{cite web}}: Check date values in: |accessdate= (help)

Exploits resulting from improper error and exception handling

[edit | edit source]

"Improper error handling". Retrieved 2014JUN25. {{cite web}}: Check date values in: |accessdate= (help)

Improper storage of sensitive data

[edit | edit source]

"CWE-591: Sensitive Data Storage in Improperly Locked Memory". Retrieved 2014JUN25. {{cite web}}: Check date values in: |accessdate= (help)

Fuzzing/false injection

[edit | edit source]
[edit | edit source]

Client-side processing vs. server-side processing

[edit | edit source]

Resource exhaustion

[edit | edit source]

Resource Management

Given a scenario, distinguish and select the method or tool that is appropriate to conduct an assessment

[edit | edit source]

Tool type

[edit | edit source]

Fuzzer

[edit | edit source]

"OWASP Testing Guide Appendix C: Fuzz Vectors". Retrieved 2014JUN25. {{cite web}}: Check date values in: |accessdate= (help)

HTTP – Hypertext Transfer Protocol interceptor

[edit | edit source]

"Intercepting Messages". {{cite web}}: |access-date= requires |url= (help); Check date values in: |accessdate= (help); Missing or empty |url= (help); Text "http://portswigger.net/burp/Help/proxy_intercept.html" ignored (help)

Attacking tools/frameworks

[edit | edit source]

"Black Hat: Top 20 hack-attack tools". {{cite web}}: |access-date= requires |url= (help); Check date values in: |accessdate= (help); Missing or empty |url= (help); Text "http://www.networkworld.com/article/2168329/malware-cybercrime/black-hat--top-20-hack-attack-tools.html" ignored (help)

Methods

[edit | edit source]

"5 ways hackers attack you (and how to counter them)". {{cite web}}: |access-date= requires |url= (help); Check date values in: |accessdate= (help); Missing or empty |url= (help); Text "http://www.usatoday.com/story/tech/columnist/komando/2013/07/19/hacker-attack-trojan-horse-drive-by-downloads-passwords/2518053/" ignored (help)