KEY CONCEPTS AND TERMS
Anomaly-based IDS
Benchmark
Black-box testing
Clipping level
Covert act
False negative
False positive
Gray-box testing
Hardened configuration
Hardening
Log file
Network mapping
Operating system fingerprinting
Overt act
Pattern- or signature-based IDS
Penetration testing
Real-time monitoring
Reconnaissance
Security audit
Security information and event management (SIEM) system
Security orchestration, automation, and response (SOAR) system
Service Organization Control (SOC)
Stateful matching
Vulnerability testing
White-box testing