Penetration Testing

3197 Words7 Pages

Penetration Testing

ABSTRACT
Penetration testing has been well popularized by the media. Many companies are now offering penetration services to identify vulnerabilities in systems and the surrounding processes. This report will Discuss “Penetration Testing” as a means of strengthening a corporate network’s security. This report is divided into three parts. Introduction will give you a brief and basic overview of Penetration Testing and why we need Penetration Testing, The second part is the technical breakdown explains The strategy, model and type of Penetration Testing. In the conclusion, we will discuss both the value and limitation of Penetration Testing.

1. INTRODUCTION
As electronic commerce, online business-to-business operations, and global connectivity have become vital components of a successful business strategy, enterprises have adopted security processes and practices to protect information assets. But if you look at today's computing environments, system security is a horrible game of numbers: there are currently over 9,223 publicly released vulnerabilities covering known security holes in a massive range of applications from popular Operating Systems through to obscure and relatively unknown web applications. [01] Over 300 new vulnerabilities are being discovered and released each month. Most companies work diligently to maintain an efficient, effective security policy, implementing the latest products and services to prevent fraud, vandalism, sabotage, and denial of service attacks. But the fact is you have to patch every hole of your system, but an attacker need find only one to get into your environment. Whilst many organisations subscribe to major vendor's security alerts, these are just the tip of the security iceberg and even these are often ignored. For example, the patch for the Code Red worm was available some weeks before the worm was released. [02]

1.1 What is Penetration Testing?
Penetration testing - using tools and processes to scan the network environment for vulnerabilities, [03& T, J.K et al. 2002] there are many different types of vulnerability assessments. Penetration Testing focuses on understanding the vulnerabilities of components that you’ve made available on the network as seen from the perspective of a skilful and determined attacker who has access to that network. It will provide a thorough overview of the ...

... middle of paper ...

.../2005)

[03] http://en.wikipedia.org/wiki/Penetration_testing (Last Access 10/03/2005)

[04] http://www.istart.co.nz/index/HM20/PC0/PV21902/EX244/AR2341 (Last Access 10/03/2005)

[05] http://www.visionael.com/products/security_audit/FBI_CSI_2003.pdf (Last Access 10/03/2005)

[06] http://www.webopedia.com/TERM/I/intrusion_detection_system.html (Last Access 10/03/2005)

[07] http://www.corecom.com/external/livesecurity/pentest.html (Last Access 18/03/2005)

[08] http://www.securenetsol.com/na_pt_test_approach.html (Last Access 20/03/2005)

[09] http://www.securityfocus.com/infocus/1722 (Last Access 20/03/2005)

[10] http://www.local4you.co.uk/Security/security_test.htm (Last Access 20/03/2005)

[11] http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci546705,00.html (Last Access 20/03/2005)

[12] http://www.netstumbler.com/2004/06/04/wireless_attacks_and_penetration_testing_part_1_of_3/
(Last Access 20/03/2005)

[13] http://lineman.net/node/270 (Last Access 20/03/2005)

[14] http://www.penetration-testing.com/ (Last Access 15/03/2005)

[15] T. J. Klevinsky, Scott Laliberte, and Ajay Gupta. (2002). Hack I.T.: Security Through Penetration Testing. Addison-Wesley Professional.

Open Document