Explore tens of thousands of sets crafted by our community.
Security Assessment Techniques
12
Flashcards
0/12
Security Auditing
A systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria.
Vulnerability Scanning
An automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened.
Risk Assessment
The process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.
Compliance Auditing
Checking to see if an organization's security controls are in line with specific established standards, regulations, or laws.
Purple Teaming
A collaborative cybersecurity exercise where the offensive (red team) and defensive (blue team) efforts work closely together to improve the organization’s security.
Ethical Hacking
Identifying vulnerabilities in a computer system by duplicating the intent and actions of malicious hackers.
Phishing Simulation
A training exercise that sends simulated phishing messages to staff to gauge their responses and improve awareness of malicious communication.
Penetration Testing
A simulated cyber attack against your computer system to check for exploitable vulnerabilities.
Security Posture Assessment
Overall review and evaluation of an organization's security stance, examining policies, procedures, hardware, and software security.
Security Awareness Training
Programs designed to educate employees about computer security, including the awareness of computing practices required to safeguard data and personal information.
Red Teaming
A multi-layered attack simulation run by highly skilled security professionals to mimic the techniques of potential attackers.
Blue Teaming
A defensive team that focuses on ensuring the organization's security measures are effective through defensive security practices.
© Hypatia.Tech. 2024 All rights reserved.