Penetration Testing and its Value to the Organization

User Generated

nyndrry_n

Writing

Description

You have recently joined Saudi-Technic, a premier security consulting firm just outside of Riyadh, Saudi Arabia. Saudi-Technic has been approached by a large manufacturing company in Medina to evaluate and test the security of its network. However, the job is not without its challenges. While the information technology (IT) director understands the value and need for a security and penetration test, other individuals in upper management do not.

You have been asked to prepare a presentation to describe what penetration is and the value that it brings to the organization.

Deliverables:

Prepare and submit a presentation briefing in Microsoft Word. This should be geared towards a non-technical executive management team.

The briefing should include the following elements:

  • A description and overview of penetration testing.
  • The value of penetration testing to the organization. This can be demonstrated with case studies, relevant media or news events, etc. If possible, use at least one example from the Middle East.
  • A description of at least three types of security tests that will be provided.
  • An explanation of how the results of the penetration test will help improve security.

The presentation briefing should be 4-6 pages in length, not including the title and reference pages, and should cite at least four scholarly resources other than the course materials. Be sure to cite and reference all sources used. Your paper should follow APA style guidelines and academic writing standards, as appropriate.

It is strongly encouraged that you submit all assignments to the Turnitin less than 20%

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

COMPLETE. Kindly download the FINAL paper below. Go through it and let me know if you need something fixed

Running head: PENETRATION TESTING

1

Penetration Testing and its Value to the Organization
Name
Instructor
Course
Date

PENETRATION TESTING

2

A penetration test commonly known as pen test is a safety or precaution process that
involves evaluating the safety of an IT infrastructure. This process involves exploiting the
vulnerability of the infrastructure in a safe way. This is made to access the security level in areas
such as in the operating systems or application flaws which are considered to be the most
vulnerable in every IT infrastructure (International Council of E-Commerce Consultants, 2011).
This process also helps to access the effectiveness of the infrastructure in responding to attacks
and its defensive mechanism in overall as well as ensuring adherence to set or defined security
policies by all end-users. This test is usually performed using manual or well-coordinated
automated technologies with the aim of intentionally compromise the servers, endpoints,
wireless networks, and web applications in a systematic way. The successfully compromised or
exploited device or software is then used by IT specialist to launch subsequent exploit to help in
accessing the vulnerability of the infrastructure.
A successful penetration test involves seven main sections that are set at standard level.
The sections include; pre-engagement interactions, intelligence gathering, threat modeling,
vulnerability analysis, exploitation, post exploitation, and reporting. This is an inception from the
level of communication about the pen test to reporting stage. The penetration test will be divided
into three steps; research, testing or exploitation, and documentation. The IT department together
with the top management will help to determine how much time will be spent in the first two
st...


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags