Explore tens of thousands of sets crafted by our community.
Security Assessment Techniques
12
Flashcards
0/12
Vulnerability Scanning
An automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened.
Penetration Testing
A simulated cyber attack against your computer system to check for exploitable vulnerabilities.
Security Auditing
A systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria.
Ethical Hacking
Identifying vulnerabilities in a computer system by duplicating the intent and actions of malicious hackers.
Risk Assessment
The process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.
Security Posture Assessment
Overall review and evaluation of an organization's security stance, examining policies, procedures, hardware, and software security.
Red Teaming
A multi-layered attack simulation run by highly skilled security professionals to mimic the techniques of potential attackers.
Blue Teaming
A defensive team that focuses on ensuring the organization's security measures are effective through defensive security practices.
Purple Teaming
A collaborative cybersecurity exercise where the offensive (red team) and defensive (blue team) efforts work closely together to improve the organization’s security.
Compliance Auditing
Checking to see if an organization's security controls are in line with specific established standards, regulations, or laws.
Phishing Simulation
A training exercise that sends simulated phishing messages to staff to gauge their responses and improve awareness of malicious communication.
Security Awareness Training
Programs designed to educate employees about computer security, including the awareness of computing practices required to safeguard data and personal information.
© Hypatia.Tech. 2024 All rights reserved.