IT Examiner School, Seaside, CA

Penetration Test (Pen Test)

Pen Test “tests” a system to find and exploit known vulnerabilities that an attacker could exploit

• Determine if there are weaknesses and if able to access system functionality and data • Are intrusive as actual “attack” tools are used • Require a high degree of skill to perform • Require management’s knowledge & consent • Pen Test report will describe any weaknesses as “high”, “medium” or “low”

Pen Test Strategies

• Targeted Testing - performed by the entity’s IT team and external testing team

• External Testing - targets externally visible servers or devices (seen by anybody on Internet) to see if they can get into internal systems and how far

• Internal Testing - mimics an insider attack by an authorized user with standard access privileges (what can happen with a disgruntled employee)

Made with FlippingBook - Online catalogs