Penetration Testing Exposed
Source: InfoSecurity Magazine - Posted by Dave Wreski   
Intrusion Detection Part three of our series on "Audits, Assessments & Tests (Oh, My)" explores penetration testing, the controversial practice of simulating real-world attacks by discovering and exploiting system vulnerabilities. We are routinely deluged with news reports detailing the exploits of attackers who . . . Part three of our series on "Audits, Assessments & Tests (Oh, My)" explores penetration testing, the controversial practice of simulating real-world attacks by discovering and exploiting system vulnerabilities. We are routinely deluged with news reports detailing the exploits of attackers who have breached the security of some of the world's most venerable institutions. With this type of attention, security has gone from the back room to the boardroom in a relatively short period. Shareholders are holding the highest levels of management accountable for security, since compromised systems directly impact stock values. How can systems managers mitigate security risk and assure business partners, shareholders and employees that their organization's digital assets are safe? Often times, organizations will implement internal or external penetration tests to simulate real-world attacks on their systems. The goal is to expose security gaps and demonstrate the effectiveness (or ineffectiveness) of their secu-rity measures.

Read this full article at InfoSecurity Magazine

Only registered users can write comments.
Please login or register.

Powered by AkoComment!