Flaw Hypothesis Methodology

System analysis and penetration technique in which the specification and documentation for an information system are analyzed to produce a list of hypothetical flaws.

This list is prioritized on the basis of the estimated probability that a flaw exists, on the ease of exploiting it, and on the extent of control or compromise it would provide. The prioritized list is used to perform penetration testing of a system.


Flaw Hypothesis Methodology

System analysis and penetration technique in which the specification and documentation for an information system are analyzed to produce a list of hypothetical flaws.

This list is prioritized on the basis of the estimated probability that a flaw exists, on the ease of exploiting it, and on the extent of control or compromise it would provide. The prioritized list is used to perform penetration testing of a system.

Used in methodology