Penetration Testing evaluates computer and network security. An attack is simulated from an external or internal point of view.
Secure Design in Software Security concerns business logic and security controls, authentication and access control as well as architecture and datastores.
To gain an understanding of a certain piece of malware is the first step in the fight against malicious software. Malware is a fast-growing threat.