Glossary
The CIA triad is a security model of three core principles used within IT security and Information Security policies within an organisation. These principles relate to the Confidentiality, Integrity, or Availability of systems or information.
What is the Information Security CIA?
The CIA triad is a security model of three core principles used within IT security and Information Security policies within…
Is Linux Good for Ethical Hacking?
Linux is commonly the preferred operating system used by Ethical Hackers and 'Infosec' professionals due to the following factors.
What is a Physical Penetration Test?
A physical penetration test (pen test) is where an ethical hacker or social engineer will try to gain entry to…
Why is Python Used for Hacking?
Python is well-known as a fast, simple and easy, readable scripting or programming language. Those features make Python one of…
What is CREST Certification?
CREST is the Council of Registered Security Testers. CREST is an international not-for-profit accreditation and certification body that represents and…
What are the Best Laptops for Pen-testers?
There isn't really such as 'the best laptop' for a pentester to use. It also really depends on the type…
What is an Android Pentest?
Penetration testing an Android application involves both the application operation, similar to how a web application test is performed through…
What is Cloud Pentesting?
Cloud Penetration Testing or 'Pentesting' typically refers to the testing of a Cloud-hosted environment such as against Amazon Web Services…
What is a False Positive in Cyber Security?
A false positive within cyber security refers to an alert or vulnerability that has been incorrectly flagged, usually caused by…