Penetration testing, also known as “pentesting,” is a simulated cyber attack against a computer system, network, or web application to test its defenses and identify vulnerabilities that an attacker could exploit.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system, such as a computer network or software application.
Application security engineering is the process of designing and building software systems with security in mind, in order to prevent or mitigate potential vulnerabilities and threats.
Cloud security refers to the measures taken to protect data, applications, and infrastructure in the cloud from unauthorized access, use, disclosure, disruption, modification, or destruction.
ISO 27001 is a standard that outlines the requirements for an information security management system (ISMS).