1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Identification methods
techniques and processes used to identify Vulnerabilities, threats, and potential risks within a system or network
Vulnerability scans
automated scans of systems or networks to identify known vulnerabilities
Application security
entails ensuring the security of software applications through various methods
Static analysis
analyzing the source code or binary code of an application without executing it, helps identify potential security issues during the development phase
Dynamic analysis
assessing the application’s behavior during runtime
Package monitoring
monitoring software packages and dependencies for security vulnerabilities, involves tracking and updating packages to ensure that known vulnerabilities are addressed promptly
Open Source Intelligence (OSINT)
gathering information from publicly available sources to understand potential threats or vulnerabilities, includes analyzing data from websites, social media, and other public repositories, goal is to gather relevant and actionable information without relying on classified or confidential sources and to understand the digital footprint of the target
Proprietary/Third Party
leveraging intelligence from private or third party sources such as commercial threat intelligence services to enhance security measures
Information Sharing Organization
participating in information sharing organizations where member entities share threat intelligence and security related information to collectively strengthen defenses
Dark Web
monitoring activities on the dark web, where cybercriminals may exchange information, tools, or compromised data helps identify potential threats
Penetration testing
involves conducting controlled, simulated attacks on systems, networks, or applications to identify Vulnerabilities and weaknesses
Responsible disclosure program
entails establishing a process for security researchers or individuals to responsibly report discovered vulnerabilities to the organization, allowing the organization to address and fix the issues before they can be exploited maliciously
Bug bounty programs
encourage ethical hacking to improve security
System/process audit
conduct a systematic examination and evaluation of an organization’s systems, process,es or controls to ensure compliance, security, and effectiveness
Physical penetration testing
involves assessing the security of physical infrastructure, such as buildings, facilities, and data centers
Offensive penetration testing
an approach where testers adopt the mindset and techniques of real world attackers to identify Vulnerabilities and weaknesses in a system
Defensive penetration testing
focuses on evaluating the effectiveness of an organization’s defensive measures, such as firewalls, intrusion detection systems, and security policies.
Integrated penetration testing
combines various techniques, tools, and approaches to assess both technical and non-technical aspects of security, provides a comprehensive evaluation of an organization’s security posture
Known environment penetration testing
assumes that the testers have prior knowledge about the target environment, including network architecture, systems, and configurations
Partially known environments
testers have some information about the target but not a complete understanding, simulates a scenario where attackers have partial knowledge about the target
Unknown environment penetration testing
involves assessing a system or network where the testers have minimal or no prior information, simulates a scenario where attackers have to discover the environment from scratch
Reconnaissance
the phase in penetration testing where information about the target system or network is gathered
Passive reconnaissance
involves collecting information about the target without directly interacting with it, include gather data from public sources, social media, or public records
Active reconnaissance
involves directly interacting with the target system or network to gather information, includes network scanning, probing, or interacting with system services to discover vulnerabilities