- Penetration testing - Chartering Chartering in the context of penetration testing involves establishing clear guidelines and agreements between the tester and the client regarding the scope, objectives, methods, legal considerations, and expected outcomes of the penetration test. It ensures ethical boundaries are observed, testing is aligned with the client's needs, and sensitive systems are handled with care.
- Penetration testing - Discovery The process of gathering as much information as possible about the target system, network, or application. This could include data about IP addresses, domain details, user inputs, network mapping, and more. The intention here is to identify potential vulnerabilities or weak spots that can be targeted during the test, often utilizing techniques like port scanning, vulnerability scanning, and network sniffing.
- Penetration testing - Exploitation A phase of a penetration test where identified vulnerabilities are actually attacked. The tester attempts to exploit these vulnerabilities in a controlled manner to emulate potential attacks an actual hacker could perform. The goal of this phase is not to cause damage but rather to understand the depth of access an attacker could potentially achieve and what kind of data or control they might be able to obtain.
- Penetration testing - Reporting The final phase of penetration testing. After the discovery and exploitation phases, all findings, including vulnerabilities, data breaches, and successful exploits, are compiled into a comprehensive report. This report provides an overview of the test's findings and offers suggestions for improving the system's security. It's a crucial document for understanding the current security posture and planning the necessary steps for enhancement.
- Penetration testing - Scanning The process of analyzing the target system, network, or application for specific vulnerabilities that can be exploited. Tools such as vulnerability scanners and port scanners are used to identify open ports and detect live systems, services used by hosts, and other potential points of entry. This process provides valuable data, which is used to devise an effective approach for the exploitation phase of the test.
- People safety in BC/DR (Business Continuity/Disaster Recovery) The measures and strategies put in place to ensure the safety and well-being of individuals during and after a disaster or disruption. This concept is used in various industries, including healthcare, government, and critical infrastructure, to prevent loss of life and minimize damage to property and the environment. Examples include emergency evacuation plans, emergency response protocols, and crisis management plans.
- Perimeter The outer boundary of a network or system, defining the area of protection and control. It is used in cyber security to refer to the edge of a network, where security measures are in place to prevent unauthorized access. Examples include firewalls and intrusion detection systems.
- Perimeter security controls Measures that are implemented at the boundary of a network or system to prevent unauthorized access and protect internal resources. It is used in network security to create a barrier between trusted and untrusted networks and to monitor and control traffic. Examples include firewalls, intrusion detection systems, and network access control.
- Periods processing The division of business operations into discrete time intervals for accounting purposes, such as days, months, or fiscal quarters. This allows for the systematic recording, analysis, and reporting of financial data and transactions.
- Peripherals These are external devices connected to a computer system, expanding its capabilities. Peripherals include items like keyboards, mice, printers, scanners, and external drives. They enable input, output, and storage functions that are not inherently part of the core computer architecture.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.