Flaw Hypothesis Methodology

February 22, 2018

How Can We Help?

You are here:
< Back

System analysis and penetration technique in which the specification and documentation for an information system are analyzed to produce a list of hypothetical flaws. This list is prioritized on the basis of the estimated probability that a flaw exists, on the ease of exploiting it, and on the extent of control or compromise it would provide. The prioritized list is used to perform penetration testing of a system.
SOURCE: CNSSI-4009