Findings Data Collection Methods
Techniques for collecting data that go into assessing BitSight risk vectors and validation for the findings.
- Crawlers
- Requesting a New Vulnerability
- Compromised Systems Events Proven to be Originating from Testing Environments
- Threat Research Process
- Reporting a Public Disclosures Event
- Data Collection Methods Overview
- Types of Collected Data
- Honeypot
- Sinkhole
- Spam Trap
- How is the Botnet Infections Risk Vector Observed?
- How is the Spam Propagation Risk Vector Observed?
- How is the Malware Servers Risk Vector Observed?
- How is the Unsolicited Communications Risk Vector Observed?
- How is the Potentially Exploited Risk Vector Observed?
- How is the TLS/SSL Certificates Risk Vector Observed?
- How is the Open Ports Risk Vector Observed?
- How are the Desktop Software and Mobile Software Risk Vectors Observed?
- How is the Mobile Application Security Risk Vector Observed?
- Mobile Application Analysis
- Mobile Application Analysis: Android
- Mobile Application Analysis: iOS
- Understanding and Troubleshooting Web Application Security Scanning
- How is the File Sharing Risk Vector Observed?
- How is the Exposed Credentials Risk Vector Observed?
- What triggers a port scanner event?