Static Analysis (Code Review)
- Involves inspecting source code and other non-executable artifacts to identify potential vulnerabilities without executing the code.
- Techniques include linting, static code analysis tools, and code audits.
Dynamic Analysis (Runtime Testing)
- Executes the code in a controlled environment to detect vulnerabilities in real-time.
- Techniques include fuzzing, penetration testing, and vulnerability scanning.
Vulnerability Management
- Identifies and assesses known vulnerabilities in software and systems.
- Uses tools such as vulnerability scanners and security information and event management (SIEM) systems.
Threat Modeling
- Identifies and analyzes potential threats to a system or application.
- Techniques include attack trees, misuse cases, and STRIDE.
Network Security Testing
- Evaluates the security of network infrastructure, including firewalls, routers, and switches.
- Techniques include network scanning, penetration testing, and vulnerability assessment.
Wireless Security Testing
- Assesses the security of wireless networks, including Wi-Fi, Bluetooth, and cellular networks.
- Techniques include signal sniffing, MAC address spoofing, and rogue access point detection.
Cloud Security Testing
- Evaluates the security of cloud infrastructure and services, such as AWS, Azure, and GCP.
- Techniques include penetration testing, vulnerability assessment, and cloud misconfiguration scanning.
Mobile Security Testing
- Assesses the security of mobile applications, devices, and operating systems.
- Techniques include static analysis, dynamic analysis, and penetration testing.
IoT Security Testing
- Evaluates the security of IoT devices and systems, such as smart homes, connected cars, and industrial equipment.
- Techniques include device profiling, protocol analysis, and vulnerability assessment.
Penetration Testing
- Simulates real-world attacks to identify unauthorized access points, vulnerabilities, and potential entry points for malicious actors.
- Techniques include social engineering, physical penetration, and network exploitation.