Skip to main contentdfsdf

Home/ Subrata Das's Library/ Notes/ Everything You Should Know About Penetration Testing

Everything You Should Know About Penetration Testing

from web site

This sheet is intended to act as a quick summary for CIO's who require a quick handle on terminology and the methodology applied in penetration testing . In a nutshell, a penetration test is a way of measuring an organisation's computer network safety. It involves gathering info in significantly the exact same way as a hacker would attempt to do, then, by analysing the details it is possible to identify prospective safety vulnerabilities.



By way of background, in the early 1970s the US Department of defence first employed this form of testing to identify weaknesses in computer systems in an work to combat hackers and other intruders from causing security breaches in their network. As of late, with the increasing use of malicious code and threats from illegal hackers, any organisation that conducts e-business or who wants to guard their networks from catastrophic information theft must be taking a look at the internal testing as a technique to decide the weaknesses and to test their internal safety policy compliance.


just click here - security penetration testing


Having a well-documented penetration test outcome, it is less complicated to strategy enhanced safety measures and minimise future attacks. The rewards from undertaking this incorporate preventing financial loss through fraud, reassuring clients and shareholders, and satisfying any government regulations which might apply to certain industries. Testing also helps to safeguard information and facts, enhance understanding of info security threats, detect systemic vulnerabilities and offer independent assurance on the effectiveness of safety controls.


A superb penetration test is just not basically an automated approach that utilizes generic software. Testing tools should emulate the actions of a malicious hacker in an work to reveal achievable safety weaknesses. This requires manual testing and adherence to strict methodologies which might be meticulously planned to ensure a tailored strategy to the person business or entity.


Strategies involve external and internal testing of servers, firewalls and domain name servers. In addition, operating systems, networking gear and software applications are also tested.



Internal testing is essential to cater for the possibility of attacks from disgruntled employees or unauthorised guests to internal databases, and in some instances double blind testing approaches are required to make sure that internal IT staff aren't in a position to compromise a program. This basically means that testing is carried out without having staff getting conscious of the testing team's activities.


Lastly, all benefits really should be carefully tabulated to provide facts which is easily understood by the client in addition to suggestions that map out suitable responses to the potential risks that have been exposed.


Any penetration testing is only actually a snapshot of the existing circumstance, and even if no weaknesses are detected, this isn't an indication that the method is absolutely secure. This limitation implies that there need to also be protocols in place to cope with security breaches as they happen. The know-how garnered from a penetration test is only the beginning point in the development of adequate security measures.

Would you like to comment?

Join Diigo for a free account, or sign in if you are already a member.

Subrata Das

Saved by Subrata Das

on Aug 24, 13