Browse Definitions :
Definition

double blind test

Double blind test is an experiment where both the subject and observer are unaware that the exercise in practice is a test. Double blind testing is referred to as the gold standard of testing.

Double blind tests are used in science experiments in medicine and psychology, including theoretical and practical testing. The lack of foreknowledge in a double blind test helps avoid biases and account for other effects that might influence results such as the placebo effect, where the belief one is being treated has an effect on results itself.

In computer security, penetration testing is often done as either single or double blind testing.  With single blind penetration testing, the hacking team testing an organization does so with little prior information. Once assigned a target organization, the team would draw on information from publically available sources. The team might draw on USENET, company websites, forums and domain name registration in order to help discover and exploit vulnerabilities. In a double blind penetration test, not only is the testing team not pre-prepared for the test, the defending organization’s IT team is also not informed in advance. Double blind penetration testing makes for a very effective simulation of a real world cyber attack.

Often in medical science clinical trials, a subject undergoing treatment often does not know if they are actually receiving treatment or a placebo. This test condition constitutes a single blind test. If the researcher also does not know which patient or patients are actually receiving treatment, this is a double blind test. Similarly in other sciences, a subject might belong to a double blind testing or control group and the researcher would not know.

This was last updated in April 2019

Continue Reading About double blind test

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close