Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
CEH IT Security Penetration Testing Step

CEH IT Security Penetration Testing Step

Ratings: (0)|Views: 22 |Likes:
Published by Sandip Dey
CEH – Penetration Testing Step
Knowledge NET

• Penetration testing is a security testing methodology that gives an attacker insight into the target’s security posture and the strength of the target’s network security. A complete security snapshot includes:
 Level I, High-level assessment. A top-down look at the organization’s policies, procedures, standards and guidelines. A Level I assessment is not usually hands-on, in that the system’s security is not actually tested.  Level II, Network e
CEH – Penetration Testing Step
Knowledge NET

• Penetration testing is a security testing methodology that gives an attacker insight into the target’s security posture and the strength of the target’s network security. A complete security snapshot includes:
 Level I, High-level assessment. A top-down look at the organization’s policies, procedures, standards and guidelines. A Level I assessment is not usually hands-on, in that the system’s security is not actually tested.  Level II, Network e

More info:

Published by: Sandip Dey on May 20, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

02/17/2014

pdf

text

original

CEH \u2013 Penetration Testing
Step
Knowledge NET
Penetration Testing
Overview

\u2022Penetration testing is a security testing methodology that
gives an attacker insight into the target\u2019s security
posture and the strength of the target\u2019s network security.
A complete security snapshot includes:

\ue000Level I, High-level assessment. A top-down look at the
organization\u2019s policies, procedures, standards and
guidelines. A Level I assessment is not usually hands-on,
in that the system\u2019s security is not actually tested.
\ue000Level II, Network evaluation. More hands-on than a
Level I assessment, a Level II assessment has some of
the Level I activities with more information gathering and
scanning.
\ue000Level III, Penetration test. A penetration test is not
usually concerned with policies. It\u2019s more about taking
the adversarial view of a hacker, by seeing what can be
accomplished and with what difficulty.
The need of Penetration
Testing

\u2022The reason a security professional may wish to conduct a penetration test of his or her company is the same as the reason a business has a security policy

\u2022Several factors have converged in the marketplace to make
penetration testing a necessity.
\u2022The skill level required to execute a hacker exploit has
steadily decreased.
\u2022The size and complexity of the network environment has
mushroomed.
\u2022The number of network and Web-based applications has
increased.
\u2022The detrimental impact of a security breach on corporate
assets and goodwill is greater than ever.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->