- Information Security Handbook
- Darren Death
- 247字
- 2021-07-02 21:55:50
Penetration testing
The penetration test is an authorized attack against an information system which is used to simulate a real attack that could be perpetrated by a black hat hacker.
Penetration testing is a very important part of the information security program and is needed in order to find hidden vulnerabilities in the information system. Many organizations implement vulnerability assessment tools but do not add penetration testing to their overall testing methodology. Penetration testing is important because it allows the information security program to uncover vulnerabilities that are not easily captured through automated means. The penetration tester takes their information security knowledge and uses it to systematically break into an information system even when a vulnerability scanner has not found a vulnerability present.
Remember that there are various levels of penetration testing:
- Those that are fully engaged and coordinated with your business and its operations personnel
- To red team penetration testing, which is the same as a black hat
Also, remember that penetration testing covers a full array of activities that include:
- Physical security test
- Network intrusions
- Social engineering, and so on
A penetration testing engagement from a white hat / ethical hacker can include services such as:
- Collecting trash from trash cans and dumpsters in order to look for passwords and intellectual property
- Pretending to be the organization's helpdesk in an attempt to retrieve user passwords
- Social engineering attacks such as phishing and spear phishing attacks
- Web-based application attacks
- Vulnerability scanning
- Port scanning and so on
- 計(jì)算機(jī)應(yīng)用
- OpenStack for Architects
- Ansible Quick Start Guide
- 走入IBM小型機(jī)世界
- 錯(cuò)覺(jué):AI 如何通過(guò)數(shù)據(jù)挖掘誤導(dǎo)我們
- Effective DevOps with AWS
- 機(jī)艙監(jiān)測(cè)與主機(jī)遙控
- 21天學(xué)通Visual Basic
- 系統(tǒng)安裝與重裝
- CompTIA Network+ Certification Guide
- 大數(shù)據(jù)技術(shù)與應(yīng)用
- Moodle Course Design Best Practices
- Word 2007,Excel 2007辦公應(yīng)用融會(huì)貫通
- 深度學(xué)習(xí)與目標(biāo)檢測(cè)
- Visual Basic項(xiàng)目開發(fā)案例精粹