SunflowerCISSP Community-crafted CISSP™ mastery
Flaw hypothesis methodology -

Flaw hypothesis methodology

Views: 0
Votes: 0 (Avg 0.0)
System analysis and penetration technique in which the specification and documentation for an information system are analyzed to produce a list of hypothetical flaws. This list is prioritized on the basis of the estimated probability that a flaw exists, on the ease of exploiting it, and on the extent of control or compromise it would provide. The prioritized list is used to perform penetration testing of a system.
Average rating: 0.0 (0 reviews)
Sign in to manage your flashcard decks and leave a comment.

Discussion (0)

No comments yet. Be the first to share your experience with this term.