CASP/1.0 Enterprise Security 40%

Distinguish which cryptographic tools and techniques are appropriate for a given situation.Edit

Cryptographic applications and proper implementationEdit

Advanced PKI conceptsEdit

Wild cardEdit

OCSP—Online Certificate Status Protocol VS CRL – Certification Revocation ListEdit

Issuance to entitiesEdit

"RFC 2510 PKI Certificate Management Protocols". http://www.ietf.org/rfc/rfc2510.txt. Retrieved 12MAY2014. 

UsersEdit

"CERT issued certificate". https://pki.cert.org/help/pki_faq.html#certissuedcertificate. Retrieved 15MAY2014. 

SystemsEdit

"How IT Works: Certificate Services". http://technet.microsoft.com/en-us/magazine/2006.08.howitworks.aspx. Retrieved 15MAY2014. 

ApplicationsEdit

Implications of cryptographic methods and designEdit

Strength vs. performance vs. feasibility to implement vs. interoperabilityEdit

"Understanding Cryptographic Performance". http://cache.freescale.com/files/32bit/doc/app_note/AN2761.pdf. Retrieved 15MAY2014.  "Elliptic Curve". http://www.nsa.gov/business/programs/elliptic_curve.shtml. Retrieved 15MAY2014. 

Transport encryptionEdit

Digital signatureEdit

HashingEdit

Code signingEdit

Non-repudiationEdit

EntropyEdit

Pseudo random number generationEdit

Perfect forward secrecyEdit

Confusion and DiffusionEdit

Distinguish and select among different types of virtualized, distributed and shared computingEdit

Advantages and disadvantages of virtualizing servers and minimizing physical space requirementsEdit

"Example of minimizing physical server space". http://arcserve.com/~/media/Files/SuccessStoryTechBriefs/patrick-air-force-base_219786.ashx. Retrieved 22MAY2014. 

VLAN – Virtual Local Area NetworkEdit

Securing virtual environments, appliances and equipmentEdit

"Virtual Environment Security". https://www.bit9.com/solutions/virtual-environment-security. Retrieved 22MAY2014. 

Vulnerabilities associated with a single physical server hosting multiple companies’ virtual machinesEdit

Vulnerabilities associated with a single platform hosting multiple companies’ virtual machinesEdit

Secure use of on-demand / elastic cloud computingEdit

Provisioning and De-provisioningEdit

Data remnantsEdit

Vulnerabilities associated with co-mingling of hosts with different security requirementsEdit

Virtual Machine EscapeEdit

Privilege elevationEdit

Virtual Desktop Infrastructure (VDI)Edit

Terminal servicesEdit

Explain the security implications of enterprise storageEdit

Virtual storageEdit

NAS- Network Attached StorageEdit

SAN – Storage Area NetworkEdit

vSAN – Virtual Storage Area NetworkEdit

iSCSI - internet Small Computer System InterfaceEdit

FCOE – Fiber Channel Over EthernetEdit

LUN – Logical Unit NumberEdit

HBA- Host Based Adapter allocationEdit

Redundancy (location)Edit

Secure storage managementEdit

MultipathEdit

SnapshotsEdit

DeduplicationEdit

Integrate hosts, networks, infrastructures, applications and storage into secure comprehensive solutionsEdit

"Integrating Application Delivery Solutions into Data Center Infrastructure". http://www.cisco.com/c/en/us/products/collateral/interfaces-modules/ace-application-control-engine-module/White_Paper_Integrating_Application_Delivery_Solutions_into_Data_Center_Infrastructure.html. Retrieved 28MAY2014. 

Advanced network designEdit

Remote accessEdit

Placement of security devicesEdit

Critical infrastructure / Supervisory Control and Data Acquisition (SCADA)Edit

VoIP - Voice over IPEdit

IPv6Edit

Complex network, Network security, solutions for data flowEdit

Unified Threat ManagementEdit

"Network Security Solutions". http://secunia.com/solutions/.  "High Performance Network Security, Enterprise and Data-Center Firewall". http://www.fortinet.com/solutions/. Retrieved 2014JUN02. 

Secure data flows to meet changing business needsEdit

"Network Security". http://www.windstreambusiness.com/solutions/network-security. Retrieved 2014JUN02. 

Secure DNS – Domain Name Service (Server)Edit

Securing zone transferEdit

TSIG- Transaction Signature Interoperability GroupEdit

Secure directory servicesEdit

LDAP – Lightweight Directory Access ProtocolEdit

AD—Active DirectoryEdit

Federated IDEdit

Single sign onEdit

Network design considerationEdit

Building layoutsEdit

Facilities managementEdit

Multitier networking data design considerationsEdit

Logical deployment diagram and corresponding physical deployment diagram of all relevant devicesEdit

Distinguish among security controls for hostsEdit

"Host Based Security Controls". http://www.networkworld.com/newsletters/2004/1101datacenter1.html. 

Host-based firewallsEdit

Trusted OS – Operating System (e.g. how and when to use it)Edit

End point security softwareEdit

Anti-malwareEdit

Anti-virusEdit

Anti-spywareEdit

Spam filtersEdit

Host hardeningEdit

Standard operating environmentEdit

Security Policy / group policy implementationEdit

Command shell restrictionsEdit

Warning bannersEdit

"System/Network Login Banners". https://security.tennessee.edu/Pages/login-banner.aspx. 

Restricted interfacesEdit

"The Benefit of Structured Interfaces in Collaborative Communication". http://www.aaai.org/Papers/Symposia/Fall/2001/FS-01-05/FS01-05-009.pdf. Retrieved 2014JUN03. 

Asset management (inventory control)Edit

Data exfiltrationEdit

HIDS – Host Based Intrusion Detection System/HIPS – Host Based Intrusion Prevention SystemEdit

NIDS – Network Based Intrusion Detection System/NIPS – Network Based Intrusion Prevention SystemEdit

Explain the importance of application securityEdit

Web application security design considerationsEdit

"Design Guidelines for Secure Web Applications". http://msdn.microsoft.com/en-us/library/ff648647.aspx. Retrieved 2014JUN16. 

Secure: by design, by default, by deploymentEdit

"A Look Inside the Security Development Lifecycle at Microsoft". http://msdn.microsoft.com/en-us/magazine/cc163705.aspx. Retrieved 2014JUN16. 

Specific application issuesEdit

XSS - Cross-Site ScriptingEdit

Click-jackingEdit

Session managementEdit

Input validationEdit

SQL injectionEdit

Application sandboxingEdit

Application security frameworksEdit

Standard librariesEdit

Industry accepted approachesEdit

Secure coding standardsEdit

"Secure Coding Standards". http://www.cert.org/secure-coding/research/secure-coding-standards.cfm?. Retrieved 2014JUN25. 

Exploits resulting from improper error and exception handlingEdit

"Improper error handling". https://www.owasp.org/index.php/Improper_error_handling. Retrieved 2014JUN25. 

Privilege escalationEdit

Improper storage of sensitive dataEdit

"CWE-591: Sensitive Data Storage in Improperly Locked Memory". http://cwe.mitre.org/data/definitions/591.html. Retrieved 2014JUN25. 

Fuzzing/false injectionEdit

Secure cookie storage and transmissionEdit

Client-side processing vs. server-side processingEdit

AJAXEdit

State managementEdit

JavaScriptEdit

Buffer overflowEdit

Memory leaksEdit

Integer overflowsEdit

Race conditionsEdit

Time of check to time of useEdit

Resource exhaustionEdit

Resource Management

Given a scenario, distinguish and select the method or tool that is appropriate to conduct an assessmentEdit

Tool typeEdit

Port scannersEdit

Vulnerability scannersEdit

Protocol analyzerEdit

Switchport analyzerEdit

Network enumeratorEdit

Password crackerEdit

FuzzerEdit

"OWASP Testing Guide Appendix C: Fuzz Vectors". https://www.owasp.org/index.php/OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors. Retrieved 2014JUN25. 

HTTP – Hypertext Transfer Protocol interceptorEdit

"Intercepting Messages". 

Attacking tools/frameworksEdit

"Black Hat: Top 20 hack-attack tools". 

MethodsEdit

"5 ways hackers attack you (and how to counter them)". 

Vulnerability assessmentEdit

Penetration testingEdit

Black boxEdit

White boxEdit

Grey BoxEdit

FingerprintingEdit

Code reviewEdit

Social engineeringEdit