Over the years I’ve written a number of articles attempting to either define, or differentiate between, various terms used within information security.
Here there are in one place.
- Security Assessment Types
- The Difference Between a Vulnerability Assessment and a Penetration Test
- The Difference Between Threats, Threat Actors, Vulnerabilities, and Risks
- The Difference Between Red, Blue, and Purple Teams
- The Definition of a Purple Team
- When to Use Vulnerability Assessments, Pentesting, Red Teams, and Bug Bounties
- The Difference Between Events, Alerts, and Incidents