2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet715/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   711   712   713   714   715   716   717   718   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Penetration Testing
Penetration testing
is another preventive measure an organization can use to counter 
attacks. A penetration test (often shortened to 
pentest
) mimics an actual attack in an 
attempt to identify what techniques attackers can use to circumvent security in an appli-
cation, system, network, or organization. It may include vulnerability scans, port scans, 
packet sniffing, DoS attacks, and social-engineering techniques.


Implementing Detective and Preventive Measures 
769
Security professionals try to avoid outages when performing penetration testing. 
However, penetration testing is intrusive and can affect the availability of a system. Because 
of this, it’s extremely important for security professionals to get written approval from 
senior management before performing any testing. 
NIST SP 800-115, “Technical Guide to Information Security Testing and 
Assessment,” includes a significant amount of information about testing, 
including penetration testing.
Regularly staged penetration tests are a good way to evaluate the effectiveness of secu-
rity controls used within an organization. Penetration testing may reveal areas where 
patches or security settings are insuffi cient, where new vulnerabilities have developed or 
become exposed, and where security policies are either ineffective or not being followed. 
Attackers can exploit any of these vulnerabilities. 
A penetration test will commonly include a vulnerability scan or vulnerability assess-
ment to detect weaknesses. However, the penetration test goes a step further and attempts 
to exploit the weaknesses. For example, a vulnerability scanner may discover that a website 
with a backend database is not using input validation techniques and is susceptible to a 
SQL injection attack. The penetration test may then use a SQL injection attack to access 
the entire database. Similarly, a vulnerability assessment may discover that employees aren’t 
educated about social-engineering attacks, and a penetration test may use social-engineering 
methods to gain access to a secure area or obtain sensitive information from employees. 
Here are some of the goals of a penetration test: 

Determine how well a system can tolerate an attack 

Identify employees’ ability to detect and respond to attacks in real time 

Identify additional controls that can be implemented to reduce risk
Penetration testing typically includes social-engineering attacks, network 
and system configuration reviews, and environment vulnerability assess-
ments. A penetration test takes vulnerability assessments and vulnerabil-
ity scans a step further by verifying that vulnerabilities can be exploited.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   711   712   713   714   715   716   717   718   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish