Security Testing
Security Testing
Vulnerability scanning: process of discovering, analyzing and reporting any security flaws and/or
vulnerabilities. Software tools are being used to automatically scan and identify any potential
risk that an organization might encounter on any of the following: network, hardware, software
and systems.
Security scanning: process for testing if the network has any vulnerabilities. Software tools used
to scan and check elements of a network, applications or devices in order to discover any
security flaws.
Penetration testing: simulated attack against the computer’s system to identify any weak spots
in a system’s defenses. Test is being used to emphasize any vulnerability of a web application
firewall and how it can be improved.
Ethical hacking: authorized attempt to gain unauthorized access to a computer system,
application, or data. Carrying out an ethical hack involves duplicating strategies and actions of
malicious attackers. This practice helps to identify security vulnerabilities which can then be
resolved before a malicious attacker has the opportunity to exploit them.
Risk assessment: identify any risk that could be associated with the testing project. Most
important aspects to analyze being: customer satisfaction, budget, schedule, competitors.