This article discusses a method for quickly assessing the security of a system before using more comprehensive methods like penetration testing.
I thought it would be a good idea to write an article about the methods that an individual should take to avoid cyber attacks. This is an extensive list of tasks, and this list is based on my view as a penetration tester. For example, what I look at when I have to conduct a social engineering attack, what I would focus on to attack a particular target, etc.
This article is about the way I structure different tasks based on their relationships with other tasks in information systems security for a better understanding.