Glossaria.net

Glossary Computer Security / Term

flaw hypothesis methodology

A systems analysis and penetration technique in which specifications and documentation for the system are analyzed and then flaws in the system are hypothesized. The list of hypothesized flaws is then prioritized on the basis of the estimated probability that a flaw exists and, assuming a flaw does exist, on the ease of exploiting it, and on the extent of control or compromise it would provide. The prioritized list is used to direct a penetration attack against the system.

Permanent link flaw hypothesis methodology - Creation date 2020-06-27


< file security Glossary / Computer Security flow control >