7 comments:

  1. Risk is the potential of gaining or losing something of value.
    A threat is a communicated intent to inflict harm.
    In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.
    A penetration test, colloquially known as a pen test, is an authorized simulated attack on a computer system, performed to evaluate the security of the system.
    An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service (DoS or related DDoS) attack.
    h
    Hack value is the notion used by hackers to express that something is worth doing or is interesting.
    A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.[1] An exploit directed at a zero-day vulnerability is called a zero-day exploit, or zero-day attack.
    types of testings are-
    black box pentesting
    white box pentesting
    grey box pentesting

    ReplyDelete
  2. - Risk is a situation involving exposure to danger.
    - Threat is something which restrain a person's freedom of action.
    - The quality or state of being exposed to the possibility of being attacked or harmed.
    - Penetration testing is an authorized simulated attack on a computer system, performed to evaluate the security of the system.
    - make full use of and derive benefit from victims.
    - Hack value is the notion used by hackers to express that something is worth doing or is interesting.
    - A zero-day attack is also sometimes defined as an attack that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.
    - Vulnerability scanning
    Security scanning
    Penetration testing
    Risk assessment
    Security auditing
    Ethical hacking
    Posture assessment

    ReplyDelete
  3. 1. Risk: It is a situation involving exposure to danger.
    2. Threat: It refers to anything that has the potential to cause serious harm to a computer system.
    3. Vulnerability: It is a weakness which can be exploited by an attacker, to perform unauthorized actions within a computer system.
    4. Penetration Testing: A penetration test, colloquially known as a pen test, is an authorized simulated attack on a computer system, performed to evaluate the security of the system.
    5. Exploit: It is a attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders.
    6. Hack Value: It refers to the motivation that causes a hacker to invest a lot of time in a thing, without this seems to make sense for an observer, but represents a hack for the hacker.
    7.'0'oh Day Attack: It is an unknown exploit in the wild that exposes a vulnerability in software or hardware and can create complicated problems well before anyone realizes something is wrong. It leaves NO opportunity for detection.


    ReplyDelete
  4. - Risk is a situation involving exposure to danger.
    - Threat is something which restrain a person's freedom of action. there is two types of threat : 1- physical 2- logical.
    - Vulnerability: It is a weakness which can be exploited by an attacker, to perform unauthorized actions within a computer system.
    - Penetration Testing: practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
    - Exploit: Another term for security vulnerability, a security exploit is an unintended and unpatched flaw in software code that exposes it to potential exploitation by hackers or malicious software code such as viruses, worms, Trojan horses and other forms of malware.
    - Hack Value: The reason or motivation for expending effort toward a seemingly useless goal, the point being that the accomplished goal is a hack.
    - zero-day attack : the attack that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.
    - Types of Testings:
    Vulnerability Scanning
    Security Scanning
    Penetration testing
    Security Auditing
    Risk Assessment
    Ethical hacking
    Posture Assessment




    ReplyDelete
  5. Risk is the potential of gaining or losing something of value.
    A threat is a communicated intent to inflict harm.
    In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.
    A penetration test, colloquially known as a pen test, is an authorized simulated attack on a computer system, performed to evaluate the security of the system.
    An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service (DoS or related DDoS) attack.
    h
    Hack value is the notion used by hackers to express that something is worth doing or is interesting.
    A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.[1] An exploit directed at a zero-day vulnerability is called a zero-day exploit, or zero-day attack.
    types of testings are-
    black box pentesting
    white box pentesting
    grey box pentesting

    ReplyDelete
  6. 1.RISK: POTENTIAL FOR LOSS OR DAMAGE EXPLOIT VULNERABILITY.
    2.THREAT: IN COMPUTER SCURITY ,A THREAT IS A POSSIBLE DANGER THAT MIGHT EXPLOIT A VULNERBILITY TO BREACH SECURITY AND CAUSE POSSIBLE HARM.
    3.VULNERABILIY: A WINDOW OF VULNERABILITY IS A TIME FRAME WITHIN DIMINISHED LACKING
    4.PENETRATION TESING: SYSTEM OR NETWORK WITH VARIOUS TECHNIQUES .THE WEAK POINT OF A SYSTEM IN THIS PROCESS IS CALLED PENETRATION TESTING
    5.EXPLOIT: TO USE SOMETHING OR TREAT SOMEBODY FOR YOUR ADVENTAGE IS CALLED EXPLOIT
    6.HACK VALUE: WHERE IS BIGGEST AND LOWEREST DATA RECIVE .IS CALLED HACK VALUE
    EXAMPLE : BANK BIGGEST DATA RECIVE . SCHOOL LOWEREST DATA RECIVE
    7. TYPE OF TESTING:
    1) ALPHA TESTING
    2) ACCEPTANCE TESTING
    3) ACCESSIBILITY TESTING
    4) BETA TESTING
    5) BACK-END TESTING
    6) BROWERS TESTING
    7) BACKWARD TESTING
    8) BLACK BOX TESTING
    9) AD-HOC TESTING
    10) BOUNDARY VALUE TESTING

    ReplyDelete
  7. 1. Risk: Chances of being hacked or lossing important data or imformation.
    2. Threat: Having chances of being robbed because you have data or imformation that must be private
    3. Vulnerability: Loop hole the the system sequrity that can be used to exploit the system.
    4. Penetration: Hacking into a system while having a written permission from the user to hack itno it.
    5. Exploit: Taking out our benefit from the vulnerabilty.
    6. Hack Value: How beneficial is that system is for us if we are going to hack that particular system.
    7. '0'oh day attack: This is the first time a vurnerabilty has beed discovered by anyone alive
    8. Types of testing:

    ReplyDelete