85 lines
2.2 KiB
TeX
85 lines
2.2 KiB
TeX
% vim: tw=0 wrap
|
|
\documentclass[12pt,a4paper]{article}
|
|
\usepackage{geometry}
|
|
\geometry{
|
|
a4paper,
|
|
top=18mm,
|
|
bottom=19mm,
|
|
}
|
|
\usepackage{lmodern}
|
|
\usepackage[utf8]{inputenc}
|
|
\usepackage[T1]{fontenc}
|
|
\usepackage[fleqn]{amsmath}
|
|
\usepackage{amssymb}
|
|
\usepackage{amsfonts}
|
|
% \usepackage{fontspec}
|
|
% \usefonttheme[onlymath]{serif}
|
|
\usepackage{multirow}
|
|
\usepackage{graphicx}
|
|
\usepackage{textcomp}
|
|
\usepackage{hyperref}
|
|
\usepackage{etoolbox}
|
|
\usepackage{longtable}
|
|
\usepackage{meta}
|
|
\usepackage[UKenglish]{babel}% http://ctan.org/pkg/babel
|
|
\usepackage[UKenglish]{isodate}% http://ctan.org/pkg/isodate
|
|
\usepackage[affil-it]{authblk}
|
|
|
|
\date{\today}
|
|
\title{\doctitle{}\\\taskName{}\\\subject{}}
|
|
\author[1]{\authorname{}}
|
|
|
|
\begin{document}
|
|
\affil{\company{}}
|
|
|
|
\maketitle
|
|
|
|
\pagebreak
|
|
|
|
\tableofcontents
|
|
\pagebreak
|
|
|
|
\section*{Task}
|
|
|
|
\newpage
|
|
|
|
\section{Scope and exceptions}
|
|
\newpage
|
|
|
|
\section{Metodology a classification}
|
|
Findings are classified as follows:
|
|
\begin{enumerate}
|
|
\item \textbf{vulnerability:} a flaw in availability or trust that denies
|
|
access to assets for authorized people or processes, allows for privileged
|
|
access to assets to unauthorized people or processes, allows unauthorized
|
|
people or processes to hide assets or themselves within the scope
|
|
\item \textbf{weakness:} a flaw in authentication, process assurance,
|
|
resiliency, continuity, that allows unauthorized people or processes to
|
|
circumvent security, but is not a vulnerability.
|
|
\item \textbf{concern:} a flaw in non-deniability, confidentiality, privacy,
|
|
integrity, notifications, that allows unauthorized people or processes to
|
|
circumvent security, but is not a weakness exposure: an unjustifiable
|
|
action, flaw, or error that provides direct or indirect visibility of
|
|
targets or assets within the chosen scope.
|
|
\item \textbf{anomaly:} any unidentifiable or unknown element which has not
|
|
been controlled and cannot be accounted for in normal operations.
|
|
\end{enumerate}
|
|
\newpage
|
|
|
|
\section{Executive summary}
|
|
\newpage
|
|
|
|
\section{Findings}
|
|
|
|
\subsection{Finding xy}
|
|
\subsubsection{Description}
|
|
\subsubsection{Clasification}
|
|
\subsubsection{Recommendations}
|
|
|
|
\subsection{Finding z}
|
|
\subsubsection{Description}
|
|
\subsubsection{Clasification}
|
|
\subsubsection{Recommendations}
|
|
|
|
\end{document}
|