Glossary
Broken authentication refers to a weakness in the design or implementation of access controls inherent in an online platform or application.
What is Broken Authentication?
Broken authentication refers to a weakness in the design or implementation of access controls inherent in an online platform or…
What is the Information Security CIA?
The CIA triad is a security model of three core principles used within IT security and Information Security policies within…
Is Linux Good for Ethical Hacking?
Linux is commonly the preferred operating system used by Ethical Hackers and 'Infosec' professionals due to the following factors.
What is a Physical Penetration Test?
A physical penetration test (pen test) is where an ethical hacker or social engineer will try to gain entry to…
Why is Python Used for Hacking?
Python is well-known as a fast, simple and easy, readable scripting or programming language. Those features make Python one of…
Internal vs External Pen Testing
The aim of the pen test is to identify weaknesses and flaws within the infrastructure’s attack surface and leverage them…
What is PCI Pen Testing?
Payment Card Industry (PCI) Penetration Testing or more commonly shortened to PCI Pen Testing is running penetration tests for the…
What is a False Positive in Cyber Security?
A false positive within cyber security refers to an alert or vulnerability that has been incorrectly flagged, usually caused by…
What is Cloud Pentesting?
Cloud Penetration Testing or 'Pentesting' typically refers to the testing of a Cloud-hosted environment such as against Amazon Web Services…