Hierarchy view
This concept is obsolete
identify ICT system weaknesses
Concept overview
Description
Analyse the system and network architecture, hardware and software components and data in order to identify weaknesses and vulnerability to intrusions or attacks. Execute diagnostic operations on cyber infrastructure including research, identification, interpretation and categorization of vulnerabilities, associated attacks and malicious code (e.g. malware forensics and malicious network activity). Compare indicators or observables with requirements and review logs to identify evidence of past intrusions.
Alternative Labels
identify cyber infrastructure vulnerabilities
identify vulnerabilities of a cyber infrastructure
Skill type
skill
Skill reusability level
sector specific skills and competences
Relationships
Broader concepts
Essential for
Optional Knowledge
Concept status
Status
released