Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Security Assessment Techniques

12

Flashcards

0/12

Still learning
StarStarStarStar

Security Auditing

StarStarStarStar

A systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria.

StarStarStarStar

Vulnerability Scanning

StarStarStarStar

An automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened.

StarStarStarStar

Risk Assessment

StarStarStarStar

The process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.

StarStarStarStar

Compliance Auditing

StarStarStarStar

Checking to see if an organization's security controls are in line with specific established standards, regulations, or laws.

StarStarStarStar

Purple Teaming

StarStarStarStar

A collaborative cybersecurity exercise where the offensive (red team) and defensive (blue team) efforts work closely together to improve the organization’s security.

StarStarStarStar

Ethical Hacking

StarStarStarStar

Identifying vulnerabilities in a computer system by duplicating the intent and actions of malicious hackers.

StarStarStarStar

Phishing Simulation

StarStarStarStar

A training exercise that sends simulated phishing messages to staff to gauge their responses and improve awareness of malicious communication.

StarStarStarStar

Penetration Testing

StarStarStarStar

A simulated cyber attack against your computer system to check for exploitable vulnerabilities.

StarStarStarStar

Security Posture Assessment

StarStarStarStar

Overall review and evaluation of an organization's security stance, examining policies, procedures, hardware, and software security.

StarStarStarStar

Security Awareness Training

StarStarStarStar

Programs designed to educate employees about computer security, including the awareness of computing practices required to safeguard data and personal information.

StarStarStarStar

Red Teaming

StarStarStarStar

A multi-layered attack simulation run by highly skilled security professionals to mimic the techniques of potential attackers.

StarStarStarStar

Blue Teaming

StarStarStarStar

A defensive team that focuses on ensuring the organization's security measures are effective through defensive security practices.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.