Overview
A structured approach for identifying, quantifying, and addressing security threats to a system or application.
More in Cybersecurity
Digital Forensics
Defensive SecurityThe process of collecting, preserving, and analysing electronic evidence for investigating security incidents.
Cybersecurity
Offensive SecurityThe practice of protecting systems, networks, and programs from digital attacks, unauthorised access, and data breaches.
Certificate Authority
Network SecurityAn entity that issues digital certificates, verifying the identity of organisations and encrypting communications.
Bug Bounty
Offensive SecurityA programme where organisations pay individuals for discovering and reporting software vulnerabilities.
Man-in-the-Middle Attack
Offensive SecurityAn attack where the attacker secretly relays and potentially alters communication between two parties.
Security Information and Event Management
Offensive SecurityTechnology that aggregates and analyses security data from across an organisation to detect threats.
Cyber Kill Chain
Offensive SecurityA model describing the stages of a cyberattack from reconnaissance through data exfiltration.
Data Loss Prevention
Data ProtectionTechnology and processes that prevent sensitive data from being lost, misused, or accessed by unauthorised users.