Please enable JavaScript.
Coggle requires JavaScript to display documents.
Purpose of Practices used to Secure a corporate Environment (Reverse…
Purpose of Practices used to Secure a corporate Environment
Penetration testing
Rules of engagement
Authorization
Exploitation
Scope
Communication
Timing
Reporting
Reverse engineering
Hardware
Source authenticity of hardware
Trusted foundry
OEM documentation
Software/malware
Fingerprinting/hashing
Decomposition
Isolation/sandboxing
Training and Exercises
Blue team
White team
Red team
Risk Evaluation
Operational Control Review
Technical Impact and Likelihood
High
Medium
Low
Technical Control Review