| トピック |
出題範囲 |
| トピック 1 |
- Information Disclosure: This part assesses the awareness of data protection officers regarding unintentional information disclosure, where sensitive data is exposed to unauthorized parties, compromising confidentiality.
|
| トピック 2 |
- Authentication-Related Vulnerabilities: This section examines how security consultants identify and address vulnerabilities in authentication mechanisms, ensuring that only authorized users can access system resources.
|
| トピック 3 |
- Directory Traversal Vulnerabilities: Here, penetration testers are assessed on their ability to detect and prevent directory traversal attacks, where attackers access restricted directories and execute commands outside the web server's root directory.
|
| トピック 4 |
- Server-Side Request Forgery: Here, application security specialists are evaluated on their ability to detect and mitigate server-side request forgery (SSRF) vulnerabilities, where attackers can make requests from the server to unintended locations.
|
| トピック 5 |
- Insecure File Uploads: Here, web application developers are evaluated on their strategies to handle file uploads securely, preventing attackers from uploading malicious files that could compromise the system.
|
| トピック 6 |
- Understanding of OWASP Top 10 Vulnerabilities: This section measures the knowledge of security professionals regarding the OWASP Top 10, a standard awareness document outlining the most critical security risks to web applications.
|
| トピック 7 |
- Same Origin Policy: This segment assesses the understanding of web developers concerning the same origin policy, a critical security concept that restricts how documents or scripts loaded from one origin can interact with resources from another.:
|
| トピック 8 |
- Brute Force Attacks: Here, cybersecurity analysts are assessed on their strategies to defend against brute force attacks, where attackers attempt to gain unauthorized access by systematically trying all possible passwords or keys.
|
| トピック 9 |
- Symmetric and Asymmetric Ciphers: This part tests the understanding of cryptographers regarding symmetric and asymmetric encryption algorithms used to secure data through various cryptographic methods.
|
| トピック 10 |
- SQL Injection: Here, database administrators are evaluated on their understanding of SQL injection attacks, where attackers exploit vulnerabilities to execute arbitrary SQL code, potentially accessing or manipulating database information.
|
| トピック 11 |
- Encoding, Encryption, and Hashing: Here, cryptography specialists are tested on their knowledge of encoding, encryption, and hashing techniques used to protect data integrity and confidentiality during storage and transmission.
|
| トピック 12 |
- Code Injection Vulnerabilities: This section measures the ability of software testers to identify and mitigate code injection vulnerabilities, where untrusted data is sent to an interpreter as part of a command or query.
|
| トピック 13 |
- Insecure Direct Object Reference (IDOR): This part evaluates the knowledge of application developers in preventing insecure direct object references, where unauthorized users might access restricted resources by manipulating input parameters.
|
| トピック 14 |
- TLS Certificate Misconfiguration: This section examines the ability of network engineers to identify and correct misconfigurations in TLS certificates that could lead to security vulnerabilities.
|
| トピック 15 |
- Securing Cookies: This part assesses the competence of webmasters in implementing measures to secure cookies, protecting them from theft or manipulation, which could lead to unauthorized access.
|
| トピック 16 |
- Security Misconfigurations: This section examines how IT security consultants identify and rectify security misconfigurations that could leave systems vulnerable to attacks due to improperly configured settings.
|
| トピック 17 |
- XML External Entity Attack: This section assesses how system architects handle XML external entity (XXE) attacks, which involve exploiting vulnerabilities in XML parsers to access unauthorized data or execute malicious code.
|
| トピック 18 |
- Privilege Escalation: Here, system security officers are tested on their ability to prevent privilege escalation attacks, where users gain higher access levels than permitted, potentially compromising system integrity.
|
| トピック 19 |
- Password Storage and Password Policy: This part evaluates the competence of IT administrators in implementing secure password storage solutions and enforcing robust password policies to protect user credentials.
|
| トピック 20 |
- Parameter Manipulation Attacks: This section examines how web security testers detect and prevent parameter manipulation attacks, where attackers modify parameters exchanged between client and server to exploit vulnerabilities.
|
| トピック 21 |
- Security Best Practices and Hardening Mechanisms: Here, IT security managers are tested on their ability to apply security best practices and hardening techniques to reduce vulnerabilities and protect systems from potential threats.
|
| トピック 22 |
- Input Validation Mechanisms: This section assesses the proficiency of software developers in implementing input validation techniques to ensure that only properly formatted data enters a system, thereby preventing malicious inputs that could compromise application security.
|
| トピック 23 |
- Authorization and Session Management Related Flaws: This section assesses how security auditors identify and address flaws in authorization and session management, ensuring that users have appropriate access levels and that sessions are securely maintained.
|
| トピック 24 |
- Vulnerable and Outdated Components: Here, software maintenance engineers are evaluated on their ability to identify and update vulnerable or outdated components that could be exploited by attackers to compromise the system.
|
| トピック 25 |
- Cross-Site Request Forgery: This part evaluates the awareness of web application developers regarding cross-site request forgery (CSRF) attacks, where unauthorized commands are transmitted from a user that the web application trusts.:
|