Glossary

A

B

Black Box Testing

Testing conducted with no prior knowledge of the target system, simulating an external attacker’s perspective.

Blue Team

The defensive security team responsible for detecting and responding to attacks (often tested by the Red Team).

C

G

Grey Box Testing

Testing with partial knowledge of the system (like user credentials or documentation), balancing realism with efficiency.

O

P

Penetration Testing (Pentest)

A simulated cyber attack against your systems to identify exploitable vulnerabilities. Unlike vulnerability assessments, penetration testing involves active exploitation to demonstrate real-world impact.

Purple Team

A collaborative approach where the Red Team and Blue Team work together to improve both offensive and defensive capabilities.

R

Red Team

An authorised group of security professionals that simulate real-world attacks against an organisation to assess detection and response capabilities. More realistic than standard penetration testing.

Rules of Engagement (RoE)

The approved guidelines for conducting a penetration test, including techniques that are authorised during testing, testing windows and timeframes, and and escalation contacts and procedures.

S

Scope

The defined boundaries of a penetration test, including which systems, networks, or applications will be tested and what methods are authorised.

V

Vulnerability Assessment

A review of security weaknesses in a system. Unlike penetration testing, this does not involve active exploitation, and focuses on the identification and severity classification of vulnerabilities.

W

White Box Testing

Penetration testing with full knowledge including source code, architecture diagrams, and credentials. Provides the most thorough assessment.