What is
Ethical Hacking in Information Security world?
Ethical
Hacking is a project consists of a computer controlled systems and / or
communications of a company or organization using the same means that a
malicious user uses to attack an organization. It's called "Ethical
Hacking" because the techniques and methodologies used are similar to
those used by hackers, but the sole purpose is to check the real and current
state of security. It gives us an external view of our systems by independent
professionals.
Who is it
for?
A Proposed
Ethical Hacking is aimed at all those organizations who wish to know their
vulnerabilities and seeking to rationalize their investment in security. A knowledge
of the real situation will apply the resources according to the criticality,
prioritizing on those requiring immediate action.
A project of
Ethical Hacking used by Penetration
Testing Company is a structured process that consists of the following
phases:
PHASE I:
DEFINITION OF CONTEXT. At this stage we define from where the test is done and
what items reached. On this basis different types of Ethical Hacking defined:
1 External
Ethical Hacking
2 Internal Ethical Hacking
3 Ethical
Hacking Web Applications
4 Denial of
Service Test
5 Other
PHASE II:
TESTING. The tests will be conducted under the premise of Black Box and White
Box. Where the customer provides no information of the items to be audited, we
are talking about black box, assuming the client to specify what items you want
to audit and what specific threats, will be talking about White Box.
PHASE III:
REPORT AND PRESENTATION OF RESULTS. The report found vulnerabilities, and the
impact they would have on the organization should be exploited by a malicious
attacker will be detailed. The minimum content of the report will:
1
Introduction
2 Executive
Summary (Non-technical staff).
3
Classification of vulnerabilities detected based on their criticality (for
staff)
4 Detail of
each of the detected vulnerabilities and recommendations to address them (for
technical personnel).
5 Annexes
In this
scheme WebImprints (an Penetration
Testing company)
synthesizes a Project Phases Ethical Hacking:
PHASE I:
DEFINITION OF CONTEXT
PHASE II:
PERFORMANCE OF TESTS
PHASE III:
REPORT AND PRESENTATION OF RESULTS
If you want
further information do not hesitate to contact us and one of our Consultants
will move without obligation to explain in detail the Information Security
business needs.
No comments:
Post a Comment