Over the years I’ve written a number of articles attempting to either define, or differentiate between, various terms used within information security.
Here there are in one place.
- Security Assessment Types
- The Difference Between a Vulnerability Assessment and a Penetration Test
- The Difference Between Threats, Threat Actors, Vulnerabilities, and Risks
- The Difference Between Red, Blue, and Purple Teams
- The Definition of a Purple Team
- When to Use Vulnerability Assessments, Pentesting, Red Teams, and Bug Bounties
- The Difference Between Events, Alerts, and Incidents
Related
- The Difference Between CSRF and Clickjacking
- The Difference Between a Programmer, a Hacker, and a Developer
- The Difference Between CWE and CVE
- A MITRE Quick Reference
- Information Security Interview Questions
- How to Build a Career in Information Security