Saturday 11 October 2014

Call Penetration Testing company before your get harmed

What is Ethical Hacking in Information Security world?
Ethical Hacking is a project consists of a computer controlled systems and / or communications of a company or organization using the same means that a malicious user uses to attack an organization. It's called "Ethical Hacking" because the techniques and methodologies used are similar to those used by hackers, but the sole purpose is to check the real and current state of security. It gives us an external view of our systems by independent professionals.

Who is it for?
A Proposed Ethical Hacking is aimed at all those organizations who wish to know their vulnerabilities and seeking to rationalize their investment in security. A knowledge of the real situation will apply the resources according to the criticality, prioritizing on those requiring immediate action.

http://www.webimprints.com

A project of Ethical Hacking used by Penetration Testing Company is a structured process that consists of the following phases:
PHASE I: DEFINITION OF CONTEXT. At this stage we define from where the test is done and what items reached. On this basis different types of Ethical Hacking defined:
1 External Ethical Hacking
2 Internal Ethical Hacking                                                                  
3 Ethical Hacking Web Applications
4 Denial of Service Test
5 Other
PHASE II: TESTING. The tests will be conducted under the premise of Black Box and White Box. Where the customer provides no information of the items to be audited, we are talking about black box, assuming the client to specify what items you want to audit and what specific threats, will be talking about White Box.

PHASE III: REPORT AND PRESENTATION OF RESULTS. The report found vulnerabilities, and the impact they would have on the organization should be exploited by a malicious attacker will be detailed. The minimum content of the report will:

1 Introduction
2 Executive Summary (Non-technical staff).
3 Classification of vulnerabilities detected based on their criticality (for staff)
4 Detail of each of the detected vulnerabilities and recommendations to address them (for technical personnel).
5 Annexes

In this scheme WebImprints (an Penetration Testing company) synthesizes a Project Phases Ethical Hacking:
PHASE I: DEFINITION OF CONTEXT
PHASE II: PERFORMANCE OF TESTS
PHASE III: REPORT AND PRESENTATION OF RESULTS

If you want further information do not hesitate to contact us and one of our Consultants will move without obligation to explain in detail the Information Security business needs.

No comments:

Post a Comment