Vulnerability Analysis (2019)
The intent of the Vulnerability Analysis Knowledge Unit is to provide students with a thorough understanding of system vulnerabilities, to include what they are, how they can be found/identified, the different types of vulnerabilities, how to determine the root cause of a vulnerability, and how to mitigate their effect on an operational system.
To complete this KU, students should be able to:
- Apply tools and techniques for identifying vulnerabilities.
- Create and apply a vulnerability map of a system.
- Apply techniques to trace a vulnerability to its root cause.
- Propose and analyze countermeasures to mitigate vulnerabilities.
- Explain the circumstances under which a vulnerability must be disclosed.
- Definition of “vulnerability”
- System modeling techniques
- Vulnerability mapping.
- Vulnerability characteristics and classification.
- Buffer overflows, privilege escalation, rootkits
- Return oriented programming
- Social Engineering Vulnerabilities
- Administrative Privileges and Their Effect on Vulnerabilities
- Root causes of vulnerabilities
- Mitigation strategies
- Analyze the expected and actual effectiveness of proposed countermeasures.
- Explain when vulnerabilities must be disclosed.
- Tools and Techniques for Identifying Vulnerabilities
- Digital Forensics, Specialization Area
- Industrial Control Systems-SCADA Security
- Network Security Administration, Specialization Area
- Network Security Engineering
- Secure Cloud Computing
- Secure Software Development
- Security Incident Analysis and Response
- System Security Administration
Related Knowledge Units
- Life-Cycle Security
- Software Assurance
- Security Risk Analysis
- Secure Programming Practices
- Software Security Analysis
- QA/Functional Testing
Original Knowledge Unit
Suggested academic readings
Sample knowledge test
Sample skills test
Sample abilities test
Additional notes or materials