CASP/1.0 Enterprise Security 40%
Distinguish which cryptographic tools and techniques are appropriate for a given situation.
editIssuance to entities
edit"RFC 2510 PKI Certificate Management Protocols". Retrieved 12MAY2014. {{cite web}}
: Check date values in: |accessdate=
(help)
Users
edit"CERT issued certificate". Retrieved 15MAY2014. {{cite web}}
: Check date values in: |accessdate=
(help)
Systems
editMuller, Randy (August 2006). "How IT Works: Certificate Services". TechNet Magazine. 2006 (August). Retrieved 2021-10-22.
Applications
editImplications of cryptographic methods and design
edit"Understanding Cryptographic Performance" (PDF). Retrieved 15MAY2014. {{cite web}}
: Check date values in: |accessdate=
(help)
"Elliptic Curve". Retrieved 15MAY2014. {{cite web}}
: Check date values in: |accessdate=
(help)
Distinguish and select among different types of virtualized, distributed and shared computing
editAdvantages and disadvantages of virtualizing servers and minimizing physical space requirements
edit"Example of minimizing physical server space". Retrieved 22MAY2014. {{cite web}}
: Check date values in: |accessdate=
(help)
Securing virtual environments, appliances and equipment
edit"Virtual Environment Security". Retrieved 22MAY2014. {{cite web}}
: Check date values in: |accessdate=
(help)
Vulnerabilities associated with a single physical server hosting multiple companies’ virtual machines
editVulnerabilities associated with a single platform hosting multiple companies’ virtual machines
editSecure use of on-demand / elastic cloud computing
editProvisioning and De-provisioning
editVulnerabilities associated with co-mingling of hosts with different security requirements
editExplain the security implications of enterprise storage
editIntegrate hosts, networks, infrastructures, applications and storage into secure comprehensive solutions
edit"Integrating Application Delivery Solutions into Data Center Infrastructure". Retrieved 28MAY2014. {{cite web}}
: Check date values in: |accessdate=
(help)
Placement of security devices
editComplex network, Network security, solutions for data flow
edit"Network Security Solutions". {{cite web}}
: Text "accessdate2014JUN02" ignored (help)
"High Performance Network Security, Enterprise and Data-Center Firewall". Retrieved 2014JUN02. {{cite web}}
: Check date values in: |accessdate=
(help)
Secure data flows to meet changing business needs
edit"Network Security". Retrieved 2014JUN02. {{cite web}}
: Check date values in: |accessdate=
(help)
Secure directory services
editLogical deployment diagram and corresponding physical deployment diagram of all relevant devices
editDistinguish among security controls for hosts
edit"Host Based Security Controls". {{cite web}}
: Text "accessdate2014JUN03" ignored (help)
Trusted OS – Operating System (e.g. how and when to use it)
editSecurity Policy / group policy implementation
editCommand shell restrictions
editWarning banners
edit"System/Network Login Banners". {{cite web}}
: Text "accessdate2014JUN03" ignored (help)
Restricted interfaces
edit"The Benefit of Structured Interfaces in Collaborative Communication" (PDF). Retrieved 2014JUN03. {{cite web}}
: Check date values in: |accessdate=
(help)
Asset management (inventory control)
editData exfiltration
editExplain the importance of application security
editWeb application security design considerations
edit"Design Guidelines for Secure Web Applications". Retrieved 2014JUN16. {{cite web}}
: Check date values in: |accessdate=
(help)
Secure: by design, by default, by deployment
edit"A Look Inside the Security Development Lifecycle at Microsoft". Retrieved 2014JUN16. {{cite web}}
: Check date values in: |accessdate=
(help)
Specific application issues
editIndustry accepted approaches
editSecure coding standards
edit"Secure Coding Standards". Retrieved 2014JUN25. {{cite web}}
: Check date values in: |accessdate=
(help)
Exploits resulting from improper error and exception handling
edit"Improper error handling". Retrieved 2014JUN25. {{cite web}}
: Check date values in: |accessdate=
(help)
Improper storage of sensitive data
edit"CWE-591: Sensitive Data Storage in Improperly Locked Memory". Retrieved 2014JUN25. {{cite web}}
: Check date values in: |accessdate=
(help)
Client-side processing vs. server-side processing
editResource exhaustion
editGiven a scenario, distinguish and select the method or tool that is appropriate to conduct an assessment
editTool type
editFuzzer
edit"OWASP Testing Guide Appendix C: Fuzz Vectors". Retrieved 2014JUN25. {{cite web}}
: Check date values in: |accessdate=
(help)
HTTP – Hypertext Transfer Protocol interceptor
edit"Intercepting Messages". {{cite web}}
: |access-date=
requires |url=
(help); Check date values in: |accessdate=
(help); Missing or empty |url=
(help); Text "http://portswigger.net/burp/Help/proxy_intercept.html" ignored (help)
Attacking tools/frameworks
edit"Black Hat: Top 20 hack-attack tools". {{cite web}}
: |access-date=
requires |url=
(help); Check date values in: |accessdate=
(help); Missing or empty |url=
(help); Text "http://www.networkworld.com/article/2168329/malware-cybercrime/black-hat--top-20-hack-attack-tools.html" ignored (help)
Methods
edit"5 ways hackers attack you (and how to counter them)". {{cite web}}
: |access-date=
requires |url=
(help); Check date values in: |accessdate=
(help); Missing or empty |url=
(help); Text "http://www.usatoday.com/story/tech/columnist/komando/2013/07/19/hacker-attack-trojan-horse-drive-by-downloads-passwords/2518053/" ignored (help)