Dictionary · NIST SP 800-115
L2 — definitions grouped by regulatory framework.
Nouns
18 senses- Active Security Testing
Security testing that involves direct interaction with a target, such as sending packets to a target.
- Banner Grabbing
The process of capturing banner information—such as application type and version—that is transmitted by a remote port when a connection is initiated.
- Covert Testing
Testing performed using covert methods and without the knowledge of the organization’s IT staff, but with the full knowledge and permission of upper management.
- External Security Testing
Security testing conducted from outside the organization’s security perimeter.
- Internal Security Testing
Security testing conducted from inside the organization’s security perimeter.
- Network Sniffing
A passive technique that monitors network communication, decodes protocols, and examines headers and payloads for information of interest. It is both a review technique and a target identification and analysis technique.
- Operating System Fingerprinting
Analyzing characteristics of packets sent by a target, such as packet headers or listening ports, to identify the operating system in use on the target.
- Passive Security Testing
Security testing that does not involve any direct interaction with the targets, such as sending packets to a target.
- Overt Testing
Security testing performed with the knowledge and consent of the organization’s IT staff.
- Password Cracking
The process of recovering secret passwords stored in a computer system or transmitted over a network.
- Penetration testing
Security testing in which evaluators mimic real-world attacks in an attempt to identify ways to circumvent the security features of an application, system, or network. Penetration testing often involves issuing real attacks on real systems and data, using the same tools and techniques used by actual attackers. Most penetration tests involve looking for combinations of vulnerabilities on a single system or multiple systems that can be used to gain more access than could be achieved through a single vulnerability.
- Phishing
A digital form of social engineering that uses authentic-looking—but bogus—emails to request information from users or direct them to a fake Web site that requests information.
- Ruleset
A table of instructions used by a controlled interface to determine what data is allowable and how the data is handled between interconnected systems.
- Rogue Device
An unauthorized node on a network.
- Rules of Engagement
Detailed guidelines and constraints regarding the execution of information security testing. The ROE is established before the start of a security test, and gives the test team authority to conduct defined activities without the need for additional permissions.
- Social engineering
The process of attempting to trick someone into revealing information (e.g., a password).
- Virtual Machine
Software that allows a single host to run one or more guest operating systems.
- vulnerability
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.