Systems and Security : Attacks, Threats, and Vulnerabilities
1.5 Techniques used in security assessments
There are several techniques used in security assessments, some of the most common include:
1. Vulnerability scanning: This involves using automated tools to identify potential security weaknesses in an IT environment.
2. Penetration testing: This is a simulated attack on a system or network that is performed with permission, with the goal of identifying vulnerabilities and measuring the effectiveness of existing security measures.
3. Social engineering: This is a tactic that exploits human emotions, such as trust or fear, to obtain sensitive information or gain unauthorized access to systems.
4. Configuration review: This is an examination of the configuration settings and security policies of a system, network, or application to ensure they are properly secured.
5. Log analysis: This involves analyzing logs generated by systems and applications to identify any suspicious or unusual activity.
6. Risk assessment: This is a systematic evaluation of the likelihood and impact of security threats to an organization, and the identification of measures to mitigate or manage these risks.
7. Application security testing: This involves testing the security of individual applications, including web applications, to identify vulnerabilities and to ensure that they are properly secured.
Threat hunting
1. Intelligence fusion
2. Threat feeds
3. Advisories and bulletins
4. Maneuver