Contribute to identifying threats and attacks for security testing TECHIS60431 Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being able to protect against attacks This standard sets out the skills needed to identify and characterise threats, vulnerabilities and attacks on information and the systems that process, store and transmit information. Performance Criteria 1. identify threats, vulnerabilities and attacks that can occur in information systems in line with organisational standards 2. analyse, evaluate, characterise and classify threats in line with external frameworks, standards, threat intelligence or advice 3. determine the different attack processes and methodologies used in line with organisational standards 4. assess and validate information on current and potential threats to the business, analysing trends and highlighting information security issues relevant to the organisation 5. test for public domain vulnerabilities and the potential for exploitation, where appropriate by conducting exploits and reports potential issues and mitigation options. 6. report potential security issues and mitigation options in line with organisational standards 7. analyse activity information and initiate an appropriate response, escalating as necessary 8. monitor network and system activity to identify potential intrusion or other anomalous behaviour 9. accurately record and report on vulnerabilities and threats to information and systems 10. research and investigate common attack techniques and recommend how to defend against them Knowledge and Understanding 1. the difference between threat, risk, attack and vulnerability 2. how threats materialise into attacks 3. where to find information about threats, vulnerabilities and attacks 4. what are the typical threats, attacks and exploits and the motivations behind them 5. how example attacks work including DDOS, phishing and buffer overflow 6. the range of techniques for determining attack methods including reconnaissance, scanning, creation, test, attack/gain access, exfiltration & exiting/kill chain etc. 7. how users are targeted in an attack and why this must be considered in defending against such attacks 8. what is meant by vulnerability and penetration testing 9. how penetration testing provides confidence of a system's security 10. the range of threats and vulnerabilities that need to be considered penetration testing design and development activities 11. what the legal requirements for penetration testing are 12. how to apply a few conventional, accepted penetration testing techniques 13. why security testing cannot guarantee security 14. when and how to schedule information security testing 15. the range of penetration testing methods and tools that are available and how to apply them 16. the importance of conducting information security tests routinely on existing services within the organisation 17. how to interpret the results from penetration testing 18. how to develop information security test plans and schedules 19. how to ensure that information security tests are carried out under controlled conditions 20. accurately record and communicate the results of penetration tests 21. how different attack vectors (routes of attack) infiltrate information 22. the range of network analysis and visualisation tools and how to use them 23. the role of analysing user behaviour and awareness 24. the typical targets of intended attacks 25. the impact of social engineering and the mind-sets of hackers Carry out security testing activities TECHIS60441 Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being able to protect against attacks This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to information security threats and vulnerabilities. Assisting applying testing methods, including penetration testing, assessing the robustness of an information system, against a coordinated attack. Performance Criteria 1. be responsible for penetration testing in own area of work 2. develop and maintain security testing standards and procedures in line with organisational standards 3. tailor the scope of testing to meet business requirements 4. undertake information security tests, under controlled conditions, to assess vulnerabilities and compliance against relevant internal and/or external standards 5. use a range of appropriate methods, tools and techniques to conduct penetration testing for the systematic identification of vulnerabilities across multiple information systems 6. select and specify the most appropriate tools to be used during penetration testing 7. design and implement tests plans for networks and information systems in line with organisational standards 8. develop test programmes to assess whether security is maintained throughout the software lifecycle 9. lead and manage a penetration testing team, prioritising resource allocation and capability management ensuring that appropriate ongoing training and development is in place 10. scan information systems and networks for public domain vulnerabilities and assesses the potential for exploitation, where appropriate by conducting exploits 11. scan web applications and services for public domain vulnerabilities and assesses the potential for exploitation, where appropriate by conducting exploits 12. scan Wi-Fi networks for public domain vulnerabilities and assesses the potential for exploitation, where appropriate by conducting exploits 13. scan control systems and networks for public domain vulnerabilities and assesses the potential for exploitation, where appropriate by conducting exploits 14. report potential issues and mitigation options for security scanning operations in line with organisational standards 15. plan and execute social engineering attack exercises to assess security awareness and culture 16. scope and plan the information security test approach, prioritising testing activity to proactively target the most significant threats and vulnerabilities 17. interpret information assurance requirements to produce information security test acceptance criteria 18. carefully plan a context driven test approach to systematically test a system in order to validate its information security status 19. design and develop accurate and clear test scripts, plans and acceptance criteria to ensure that information assurance requirements can be tested against relevant internal and/or external standards 20. critically review the results of penetration testing and accurately identify specific vulnerabilities within any specified information system 21. prioritise outcomes and recommend specific and timely action to address vulnerabilities identified as a result of information security testing 22. clearly report on and communicate the results of information security testing, recommending mitigation actions 23. ensure information security testing reports are high quality and relevant to the audience 24. communicate the results of information security testing to a range of audiences justifying and evidencing any recommendations on security failures and non-compliance Knowledge and Understanding 1. the specific threats that may be of particular importance to any particular information system 2. how to organise an information security testing approach following standard procedures 3. how to use the range of tools and techniques that can be applied for penetration testing 4. relevant UK legislation and its impact on penetration testing (including computer misuse act 1990; human rights act 1998 data protection act 1998 police and justice act 2006 5. the latest information and data on a wide range of information security vulnerabilities 6. the importance of ensuring that information security testing is designed to ensure testing of all aspects of information systems across the core principles: ( including confidentiality integrity availability authorisation authentication non repudiation ) 7. the potential impact of the vulnerabilities identified on any information system and on the organisation 8. where to find the latest information on vulnerabilities or exploits and can design tests to identify them Manage security testing activities TECHIS60451 Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being able to protect against attacks This standard covers the competencies concerning with managing security testing activities in order to contribute to the determination of the level of resilience of an information system to information security threats and vulnerabilities. This includes managing resources activities and deliverables. This includes planning, conducting and reporting on comprehensive penetration testing approaches, as well as designing and implementing organisational policies, standards and processes. Performance Criteria 1. lead security testing activities related to the implementation and use of tools for testing and reporting in line with organisational standards 2. design, implement and maintain the standards processes, procedures, methods, tools and techniques to conduct information security assessments 3. design, simulate, and execute controlled attacks on networks and systems as part of a comprehensive penetration testing approach in line with organisational standards 4. apply existing and emerging methods to test and identify vulnerabilities to network and information systems 5. select and specify the most appropriate tools to be used during penetration testing 6. clearly define the scope of penetration testing assignments in alignment with test scenarios 7. lead and manage a penetration testing team, prioritising resource allocation and capability management ensuring that appropriate ongoing training and development is in place 8. source, gather and collate information and data about the vulnerabilities identified as a result of penetration testing and the potential impact on the organisation's information systems and assets 9. critically review the results of penetration testing, identifying priorities for action where appropriate 10. communicate the results of information security testing to a range of audiences justifying and evidencing any recommendations on security failures and non-compliance 11. review and update information security testing processes and standards where appropriate to reflect the changing nature of security threats and risks 12. prioritise and implement improvements to the organisation's information systems and assets to reduce the risks associated with identified vulnerabilities, documenting such changes Knowledge and Understanding 1. what information security testing can test for and the limitations 2. how to use the range of tools and techniques that can be applied for information security testing 3. the role and importance of proactive activities, such as penetration testing to identify vulnerabilities within the organisation's network and information systems infrastructure and assets 4. how to translate the target systems into test plans and scripts 5. the results and outcomes of information security testing activities in identifying security issues and informing and directing 6. the importance in ensuring that information security testing is conducted proactively and routinely/regularly through the lifecycle and lifetime of network and information systems 7. the range of scanning and testing activities that can be used to identify vulnerabilities in an organisation's network and information system 8. the range of current, identified vulnerabilities that exist and need to be tested for 9. the external standards, best practice frameworks and codes of conduct that an organisation's information systems infrastructure assets should comply with 10. how to ensure that processes and procedures are implemented and followed to restrict the knowledge of new vulnerabilities until appropriate remediation or mitigation is available 11. how to design, develop and implement metrics for monitoring the level of vulnerabilities through penetration testing 12. how to identify the potential business impacts if vulnerabilities are exploited 13. how to maintain lists of authorised or banned applications or devices for use on protective monitoring systems