Ensuring Security in a System

 Exploits

  • A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). 
An Exploit can cause,
  • Gaining control of a computer system.
  • Allowing privilege escalation
  • Denial-of-service (DoS or related DDoS) attack.

Vulnerability Assessment

  • The process of defining, identifying, classifying and prioritizing vulnerabilities in Information systems, applications and network infrastructures and providing the organization doing the assessment with the necessary knowledge, awareness and risk background to understand the threats to its environment and react appropriately.

Penetration Testing 

  • Also called pen testing or ethical hacking.
  • The practice of testing a Information system, network or web application to find security vulnerabilities that an attacker could exploit. 
  • The process involves gathering information about the target before the test, identifying possible entry points, attempting to break in either virtually or for real and reporting back the findings.
  • Penetration testing can be automated with software applications or performed manually. 
Goals of Penetrating Testing

  • Identify weak spots in an organization's security posture
  • Measure the compliance of its security policy
  • Test the staff's awareness of security issues
  • Determine whether and how the organization would be subject to security disasters.

Comments

Post a Comment

Popular posts from this blog

What is Cybersecurity?

CIA Triad