SlideShare a Scribd company logo
1 of 2
Download to read offline
WHAT IS PENETRATION TESTING?
What is Penetration Testing, Penetration testing, pen testing, or pen test is an ethical cyber security
assessment practice that targets to identify vulnerabilities by safely exploiting them the way attackers
would do and then helping to eliminate those vulnerabilities. Penetration testing is conducted on the
complete IT infrastructure of the organization, including networks, devices, applications, remote IT
environments, etc.
In the world of computer security, penetration testing is one of the most important concepts. Testing is a
method used to test a computer system or network to identify possible points where unauthorized access
can be obtained. The purpose of penetration testing is to locate any and all points of vulnerability within
the computer system. Basically the person doing the penetration is trying to hack into the system.
The term ethical hacking was devised to describe a tester who is hired to try and breach security in a
computer system. Whereas the illegal hacker will steal information for the purposes of committing a
crime, the ethical hacker will report information about hacking results so security can be improved. During
penetration, someone has been authorized to breach a security system...if he or she can.
Assessing the Risk
Penetration testing can search for security system weaknesses in several ways.
* External Pt - tests system host and networked systems including servers and software such as firewalls
* Application Security Assessment - tests threats to a computer system which are coming from proprietary
applications and usually involves security testing through interactive access
* Internet Security Assessment - an expanded version of external penetration testing which tests from
multiple points of access
* Wireless Security Assessment - tests the security of a system where people are able to access it through
wireless devices or by some form of remote access
* Other testing of new technologies - tests security of the system when access is possible through current
and developing technologies such as VOIP or mailbox access
As you can see, assessing the risk of a security system through penetrat can be complex depending on the
type of system involved. Testing can be done periodically, but it is much better to use proactive testing
which is ongoing testing 24 hours a day and seven days a week. This is the ultimate in security testing,
because it means the computer system is always being checked for hacking attempts and provides
management with the information needed to keep security high at all times.
Convince Me of the Benefits
There are a number of benefits you get with penetrat. The most common test performed is the External
Penetration Test. When this test is completed, you get valuable information which can be used to enhance
security to protect company assets.
* Vulnerability report indicating most likely breach locations
* Testing of all security components including router and firewall testing
* Password testing including identifying employees who have chosen vulnerable passwords
* Application testing to insure system has not been modified
* Communication testing
* Wireless security testing
Experts in penetrate will perform comprehensive testing procedures which make a ferocious attack on
the computer system. The goal of the tester is to gain access to sensitive and useable company data. There
will be many different approaches taken just like a real hacker would use.
At the completion of testing, management gets a report which details the results. This information can
then be used to strengthen the computer security system.

More Related Content

Similar to WHAT IS PENETRATION TESTING.pdf

Learn more about the Penetration Services
Learn more about the Penetration ServicesLearn more about the Penetration Services
Learn more about the Penetration Serviceswilnawilliams3
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
M.Tech. IDS Lecture-Mid Term.pptx
M.Tech. IDS        Lecture-Mid Term.pptxM.Tech. IDS        Lecture-Mid Term.pptx
M.Tech. IDS Lecture-Mid Term.pptxpawandeoli1
 
M.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era universityM.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era universitypheonix4
 
Security testing vikesh kumar
Security testing vikesh kumarSecurity testing vikesh kumar
Security testing vikesh kumarVikesh Kumar
 
What is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfWhat is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfElanusTechnologies
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...Alisha Henderson
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodOpen Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodFalgun Rathod
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdfMing Man Chan
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerShivamSharma909
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET Journal
 
Infrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingInfrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingElanusTechnologies
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
 
Access control attacks
Access control attacksAccess control attacks
Access control attacksYaakub Idris
 

Similar to WHAT IS PENETRATION TESTING.pdf (20)

Learn more about the Penetration Services
Learn more about the Penetration ServicesLearn more about the Penetration Services
Learn more about the Penetration Services
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
M.Tech. IDS Lecture-Mid Term.pptx
M.Tech. IDS        Lecture-Mid Term.pptxM.Tech. IDS        Lecture-Mid Term.pptx
M.Tech. IDS Lecture-Mid Term.pptx
 
M.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era universityM.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era university
 
Security testing vikesh kumar
Security testing vikesh kumarSecurity testing vikesh kumar
Security testing vikesh kumar
 
What is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfWhat is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdf
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Penetration Testing Service in India Senselearner .pdf
Penetration Testing Service in India Senselearner .pdfPenetration Testing Service in India Senselearner .pdf
Penetration Testing Service in India Senselearner .pdf
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Network Penetration Testing Service
Network Penetration Testing ServiceNetwork Penetration Testing Service
Network Penetration Testing Service
 
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodOpen Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
 
Infrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingInfrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration Testing
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Access control attacks
Access control attacksAccess control attacks
Access control attacks
 

More from MuhammadWaqas779561

UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdfUNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdfMuhammadWaqas779561
 
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...MuhammadWaqas779561
 
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...MuhammadWaqas779561
 
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdfBREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdfMuhammadWaqas779561
 
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdfWHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdfMuhammadWaqas779561
 
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdfMIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdfMuhammadWaqas779561
 
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdfMICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdfMuhammadWaqas779561
 
INDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdfINDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdfMuhammadWaqas779561
 
The black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdfThe black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdfMuhammadWaqas779561
 
BOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdfBOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdfMuhammadWaqas779561
 
Criminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdfCriminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdfMuhammadWaqas779561
 

More from MuhammadWaqas779561 (20)

UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdfUNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
 
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
 
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
 
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdfBREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
 
MICHELE TECCHIA.pdf
MICHELE TECCHIA.pdfMICHELE TECCHIA.pdf
MICHELE TECCHIA.pdf
 
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdfWHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
 
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdfMIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
 
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdfMICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
 
MICHELE TECCHIA BIOGRAPHY.pdf
MICHELE TECCHIA BIOGRAPHY.pdfMICHELE TECCHIA BIOGRAPHY.pdf
MICHELE TECCHIA BIOGRAPHY.pdf
 
INDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdfINDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdf
 
ROMANIA TOURS AND VACATIONS.pdf
ROMANIA TOURS AND VACATIONS.pdfROMANIA TOURS AND VACATIONS.pdf
ROMANIA TOURS AND VACATIONS.pdf
 
PATH TO PERMANENT RESIDENCE.pdf
PATH TO PERMANENT RESIDENCE.pdfPATH TO PERMANENT RESIDENCE.pdf
PATH TO PERMANENT RESIDENCE.pdf
 
BIOGRAPHY OF PAUL LIGNIERES.pdf
BIOGRAPHY OF PAUL LIGNIERES.pdfBIOGRAPHY OF PAUL LIGNIERES.pdf
BIOGRAPHY OF PAUL LIGNIERES.pdf
 
MICHELE TECCHIA.pdf
MICHELE TECCHIA.pdfMICHELE TECCHIA.pdf
MICHELE TECCHIA.pdf
 
Jean-Pierre Valentini.pdf
Jean-Pierre Valentini.pdfJean-Pierre Valentini.pdf
Jean-Pierre Valentini.pdf
 
The black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdfThe black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdf
 
BOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdfBOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdf
 
Paul Ligniere.pdf
Paul Ligniere.pdfPaul Ligniere.pdf
Paul Ligniere.pdf
 
Criminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdfCriminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdf
 
Yassine Yakouti.pdf
Yassine Yakouti.pdfYassine Yakouti.pdf
Yassine Yakouti.pdf
 

Recently uploaded

WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxran17april2001
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 

Recently uploaded (20)

WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptx
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 

WHAT IS PENETRATION TESTING.pdf

  • 1. WHAT IS PENETRATION TESTING? What is Penetration Testing, Penetration testing, pen testing, or pen test is an ethical cyber security assessment practice that targets to identify vulnerabilities by safely exploiting them the way attackers would do and then helping to eliminate those vulnerabilities. Penetration testing is conducted on the complete IT infrastructure of the organization, including networks, devices, applications, remote IT environments, etc. In the world of computer security, penetration testing is one of the most important concepts. Testing is a method used to test a computer system or network to identify possible points where unauthorized access can be obtained. The purpose of penetration testing is to locate any and all points of vulnerability within the computer system. Basically the person doing the penetration is trying to hack into the system. The term ethical hacking was devised to describe a tester who is hired to try and breach security in a computer system. Whereas the illegal hacker will steal information for the purposes of committing a crime, the ethical hacker will report information about hacking results so security can be improved. During penetration, someone has been authorized to breach a security system...if he or she can. Assessing the Risk Penetration testing can search for security system weaknesses in several ways. * External Pt - tests system host and networked systems including servers and software such as firewalls * Application Security Assessment - tests threats to a computer system which are coming from proprietary applications and usually involves security testing through interactive access * Internet Security Assessment - an expanded version of external penetration testing which tests from multiple points of access * Wireless Security Assessment - tests the security of a system where people are able to access it through wireless devices or by some form of remote access * Other testing of new technologies - tests security of the system when access is possible through current and developing technologies such as VOIP or mailbox access As you can see, assessing the risk of a security system through penetrat can be complex depending on the type of system involved. Testing can be done periodically, but it is much better to use proactive testing which is ongoing testing 24 hours a day and seven days a week. This is the ultimate in security testing, because it means the computer system is always being checked for hacking attempts and provides management with the information needed to keep security high at all times. Convince Me of the Benefits There are a number of benefits you get with penetrat. The most common test performed is the External Penetration Test. When this test is completed, you get valuable information which can be used to enhance security to protect company assets. * Vulnerability report indicating most likely breach locations
  • 2. * Testing of all security components including router and firewall testing * Password testing including identifying employees who have chosen vulnerable passwords * Application testing to insure system has not been modified * Communication testing * Wireless security testing Experts in penetrate will perform comprehensive testing procedures which make a ferocious attack on the computer system. The goal of the tester is to gain access to sensitive and useable company data. There will be many different approaches taken just like a real hacker would use. At the completion of testing, management gets a report which details the results. This information can then be used to strengthen the computer security system.