Content deleted Content added
various changes |
Rm non-authoritative blog reference. Blogs are generally not considered RS. |
||
Line 8:
== Confidentiality ==
* A security measure which protects against the disclosure of information to parties other than the intended recipient is by no means the only way of ensuring the security.
== Integrity ==
Line 16 ⟶ 15:
* A measure intended to allow the receiver to determine that the information provided by a system is correct.
* Integrity schemes often use some of the same underlying technologies as confidentiality schemes, but they usually involve adding information to a communication, to form the basis of an algorithmic check, rather than the encoding all of the communication.
* To check if the correct information is transferred from one application to other.
== Authentication ==
This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labelling claims to be, or assuring that a [[computer program]] is a trusted one.
== Authorization ==
Line 45 ⟶ 43:
* '''Vulnerability Assessment''' - This uses discovery and vulnerability scanning to identify security vulnerabilities and places the findings into the context of the environment under test. An example would be removing common false positives from the report and deciding risk levels that should be applied to each report finding to improve business understanding and context.
* '''Security Assessment''' - Builds upon Vulnerability Assessment by adding manual verification to confirm exposure, but does not include the exploitation of vulnerabilities to gain further access. Verification could be in the form of authorized access to a system to confirm system settings and involve examining logs, system responses, error messages, codes, etc. A Security Assessment is looking to gain a broad coverage of the systems under test but not the depth of exposure that a specific vulnerability could lead to.
* '''Penetration Test''' - [[Penetration test]] simulates an attack by a malicious party. Building on the previous stages and involves exploitation of found vulnerabilities to gain further access. Using this approach will result in an understanding of the ability of an attacker to gain access to confidential information, affect data integrity or availability of a service and the respective impact. Each test is approached using a consistent and complete methodology in a way that allows the tester to use their problem solving abilities, the output from a range of tools and their own knowledge of networking and systems to find vulnerabilities that would
* '''Security Audit''' - Driven by an Audit
* '''Security Review''' - Verification that industry or internal security standards have been applied to system components or product. This is typically completed through gap analysis and utilizes build
== Tools ==
|