Some HAcKing Terms ! Generally Used



INFOSEC
 


*Information security, which is the practices of Preventing unauthorized access, use, Disclosure, disruption, Modification, Inspection, Recording or destruction of information . type information or data may take any form, e.g. Electronic or physical. Infosec can also be a person who practices ethical security.


OPSEC


*Operation security, which is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determine if information obtained by Adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information.


RED TEAM


*The Red Team is an Independent  Group that Challenges an organization to improve its effectiveness by assuming an adversarial role or point of view. It is particularly effective In organization With Strong Culture and Fixed ways of Approaching Problems.


BLUE TEAM


*A Blue team is a group of individuals who perform an analysis of information system to ensure Security, Identify security Flaws, Verify the effectiveness of each Security Measures and to make certain all security measure  will continue to be effective after implementation. As a result, Blue teams Were Developed to design defensive measures against red team activities . They are Defenders.


PENETRATION TESTER 


*An Ethical hacker who practice security, Test Application And System to prevent Intrusions or find vulnerabilities.


SECURITY RESEARCHERS


*Someone who practice pen testing and browser the web to find phishing/fake websites, infected servers, bugs or vulnerabilities. he can work for a company as a security consultant, he is most likely a Blue Teamer .


THREAT HUNTER


*A Threat Hunter, also called a cyber security threat analyst, is a security professional or managed service provider ( MSP ) that proactively uses manual or machine assisted technique to detect security Incidents that may elude the grasp of automated system.





Comments

Popular posts from this blog

Polymerase Chain Reaction (PCR) and its Applications

REAL TIME PCR and its Application notes

Six Powerful Attacks In Cyber world .