The act of analyzing a software system for vulnerabilities, examining potential threats associated with those vulnerabilities, and evaluating the resulting security risks is called _________
____________ provides advice, direction and best practice in instances where it is often difficult to regulate how something should be done. Compliance with guidelines is not obligatory.
___________ systems compare the current network activity to a known threat database to detect several kinds of behaviors like security policy violations, malware, and port scanners