1. Vulnerability Assessments - a technical assessment designed to show as many vulnerabilities as possible in an environment, along with severity and remediation priority information.
2. Penetration Assessment - a technical assessment designed to achieve a specific goal, e.g., to steal customer data, to gain domain administrator, or to modify sensitive salary information
3. Red Team Assessments - Identifies a vulnerability in the systems organizations infrastructure and defense network to test the organizations identifications and response time.
4. Security Audit - An audit can be technical and/or documentation-based, and focuses on how an existing configuration compares to a desired standard. This audit doesn’t prove or validate security; it validates conformance on what security means
5. Risk Assessment - conducted to determine the most important risks facing a given organization for the purposes of ensuring that they are brought within acceptable levels for the business. They can take many forms, but the output is always a list of prioritized risks, followed by recommendations.
6. Threat Assessment - are for determining whether a given threat, is worth spending limited resources on. Output is usually a recommendation of what, or any amount of effort should be dedicated to the issue.
Copyright © 2021 Ram Tech - All Rights Reserved.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.