Glossary

Broken authentication refers to a weakness in the design or implementation of access controls inherent in an online platform or application.

Broken iphone screen

What is Broken Authentication?

Broken authentication refers to a weakness in the design or implementation of access controls inherent in an online platform or…

Woman against a graphic background

What is the Information Security CIA?

The CIA triad is a security model of three core principles used within IT security and Information Security policies within…

Keyboard

Is Linux Good for Ethical Hacking?

Linux is commonly the preferred operating system used by Ethical Hackers and 'Infosec' professionals due to the following factors.

Person pressing a floor button in a lift

What is a Physical Penetration Test?

A physical penetration test (pen test) is where an ethical hacker or social engineer will try to gain entry to…

Python with blue eyes

Why is Python Used for Hacking?

Python is well-known as a fast, simple and easy, readable scripting or programming language. Those features make Python one of…

Man typing on laptop

Internal vs External Pen Testing

The aim of the pen test is to identify weaknesses and flaws within the infrastructure’s attack surface and leverage them…

Mastercard

What is PCI Pen Testing?

Payment Card Industry (PCI) Penetration Testing or more commonly shortened to PCI Pen Testing is running penetration tests for the…

Man sitting at a desk with laptop in a high rise building

What is a False Positive in Cyber Security?

A false positive within cyber security refers to an alert or vulnerability that has been incorrectly flagged, usually caused by…

A person typing on a keyboard that is lit up against a dark background

What is Cloud Pentesting?

Cloud Penetration Testing or 'Pentesting' typically refers to the testing of a Cloud-hosted environment such as against Amazon Web Services…