Please enable JavaScript.
Coggle requires JavaScript to display documents.
Techniques used in security assessments. - Coggle Diagram
Techniques used in security assessments.
Syslog/Security information and event management (SIEM)
User behavior analysis
Sentiment analysis
Data inputs
Security monitoring
Packet capture
Log aggregation
Review reports
Log collectors
Security orchestration
Threat hunting
Intelligence fusion
Advisories and bulletins
Threat feeds
Maneuver
Automation, and response (SOAR)
Vulnerability scans
False positives
Log reviews
False negatives
Credentialed vs. non-credentialed
Configuration review
Intrusive vs. non-intrusive
Vulnerability Scoring System (CVSS)
Application
Exposures (CVE)/Common
Web application
Common Vulnerabilities and
Network