Skip to content

Information Security Definitions

May 26, 2023

white-tiger-e1454761678466-1

Over the years I’ve written a number of articles attempting to either define, or differentiate between, various terms used within information security.

Here there are in one place.

  • Security Assessment Types
  • The Difference Between a Vulnerability Assessment and a Penetration Test
  • The Difference Between Threats, Threat Actors, Vulnerabilities, and Risks
  • The Difference Between Red, Blue, and Purple Teams
  • The Definition of a Purple Team
  • When to Use Vulnerability Assessments, Pentesting, Red Teams, and Bug Bounties
  • The Difference Between Events, Alerts, and Incidents
  • The Difference Between CSRF and Clickjacking
  • The Difference Between a Programmer, a Hacker, and a Developer
  • The Difference Between CWE and CVE
  • A MITRE Quick Reference
  • Information Security Interview Questions
  • How to Build a Career in Information Security