CompTIA PenTest+
1 Threats, Attacks, and Vulnerabilities
1-1 Common Threat Actors
1-2 Threat Intelligence Sources
1-3 Threat Actors and Motives
1-4 Threat Actor Tactics, Techniques, and Procedures (TTPs)
1-5 Vulnerability Types
1-6 Exploit Types
1-7 Attack Types
1-8 Threat Detection and Monitoring
1-9 Threat Hunting
1-10 Incident Response
2 Architecture and Design
2-1 Security Controls
2-2 Network Architecture
2-3 Cloud and Virtualization
2-4 Web Application Security
2-5 Wireless Security
2-6 Mobile Security
2-7 IoT Security
2-8 Industrial Control Systems (ICS) Security
2-9 Physical Security
2-10 Secure Software Development
3 Tools and Code
3-1 Penetration Testing Tools
3-2 Exploitation Tools
3-3 Post-Exploitation Tools
3-4 Reporting Tools
3-5 Scripting and Automation
3-6 Programming Languages
3-7 Code Analysis
3-8 Open Source Intelligence (OSINT) Tools
4 Planning and Scoping
4-1 Penetration Testing Methodologies
4-2 Legal and Compliance Considerations
4-3 Scope Definition
4-4 Risk Assessment
4-5 Threat Modeling
4-6 Information Gathering
4-7 Asset Identification
4-8 Data Classification
4-9 Business Impact Analysis
4-10 Penetration Testing Objectives
5 Information Gathering and Vulnerability Identification
5-1 Passive Reconnaissance
5-2 Active Reconnaissance
5-3 Vulnerability Scanning
5-4 Network Mapping
5-5 Service Identification
5-6 Web Application Scanning
5-7 Wireless Network Scanning
5-8 Social Engineering Techniques
5-9 OSINT Techniques
5-10 Vulnerability Databases
6 Attacks and Exploits
6-1 Exploit Development
6-2 Buffer Overflows
6-3 SQL Injection
6-4 Cross-Site Scripting (XSS)
6-5 Cross-Site Request Forgery (CSRF)
6-6 Command Injection
6-7 Privilege Escalation
6-8 Lateral Movement
6-9 Evasion Techniques
6-10 Exploit Delivery Methods
7 Penetration Testing Process
7-1 Pre-Engagement Activities
7-2 Reconnaissance
7-3 Scanning and Enumeration
7-4 Exploitation
7-5 Post-Exploitation
7-6 Reporting
7-7 Remediation
7-8 Retesting
7-9 Documentation and Evidence Collection
7-10 Communication and Coordination
8 Reporting and Communication
8-1 Report Structure
8-2 Executive Summary
8-3 Technical Findings
8-4 Risk Assessment
8-5 Remediation Recommendations
8-6 Legal and Compliance Considerations
8-7 Presentation Skills
8-8 Communication with Stakeholders
8-9 Documentation Standards
8-10 Continuous Improvement
9 Security and Compliance
9-1 Regulatory Requirements
9-2 Industry Standards
9-3 Compliance Audits
9-4 Data Protection
9-5 Privacy Laws
9-6 Incident Response Planning
9-7 Disaster Recovery Planning
9-8 Business Continuity Planning
9-9 Risk Management
9-10 Security Awareness Training
4.4 Risk Assessment Explained

4.4 Risk Assessment Explained

Key Concepts

1. Risk Identification

Risk Identification is the process of recognizing potential threats and vulnerabilities that could impact an organization's assets. This involves gathering information about the environment, assets, and potential threats to identify risks that need to be managed.

Example: During a risk assessment, a company identifies that its web servers are exposed to the internet, making them vulnerable to cyber-attacks such as Distributed Denial of Service (DDoS) attacks and SQL injection.

2. Risk Analysis

Risk Analysis involves evaluating the identified risks to understand their potential impact and likelihood. This process helps in prioritizing risks based on their severity and the probability of occurrence.

Example: After identifying the risk of DDoS attacks on web servers, a risk analysis is conducted to determine the potential impact (e.g., financial loss, reputation damage) and the likelihood of such an attack occurring.

3. Risk Evaluation

Risk Evaluation compares the results of the risk analysis against risk criteria to decide which risks need to be addressed. This involves determining whether the identified risks are acceptable or if mitigation measures are required.

Example: Based on the risk analysis, the company evaluates whether the risk of DDoS attacks is within acceptable limits or if additional security measures, such as implementing a Web Application Firewall (WAF), are necessary.

4. Risk Treatment

Risk Treatment involves selecting and implementing measures to modify risks. This can include avoiding the risk, reducing the risk, sharing the risk, or accepting the risk. The goal is to manage risks to an acceptable level.

Example: The company decides to implement a WAF and distribute the risk by purchasing cyber insurance to reduce the impact of a potential DDoS attack.

Examples and Analogies

Consider a home security system as an analogy for risk assessment:

1. Risk Identification: Identifying potential threats such as burglars, fires, and natural disasters that could impact the home.

2. Risk Analysis: Evaluating the likelihood and impact of these threats, such as the potential financial loss from a burglary or the damage from a fire.

3. Risk Evaluation: Comparing the analyzed risks against the homeowner's risk tolerance to decide if additional security measures are needed.

4. Risk Treatment: Implementing measures such as installing security cameras, smoke detectors, and fire extinguishers to manage the identified risks.

By understanding and applying these risk assessment concepts, organizations can effectively identify, analyze, evaluate, and treat risks, ensuring a more secure and resilient environment.