Securing System Access and Sessions

User Generated

Zhngu2000

Computer Science

Description

To begin, read the following: https://www.veracode.com/security/penetration-testing

Given this information, research Kali Linux, including the tools it contains and how it can assist a penetration tester in identifying vulnerabilities in the network. Once you have done that, answer the following questions as though you were an internal or external penetration test firm assisting a Saudi company in strengthening their systems, framework, and network.

1. How does the penetration test differ from other types of security testing – such as a vulnerability assessment?
2. What is your process for performing the penetration test? Explain in detail and discuss the process and tools that would be used.
3. How will you protect the company’s data during and after testing?
4. How will you ensure the availability of systems and services while the test is taking place?

These last two will be key. Unless you are performing the penetration test when their users are not active, it will be necessary to catalog how you will do this without disrupting business or destroying data.

Book:

Chapter 12 in Hacker Techniques, Tools, and Incident Handling. Online Book Reading: https://books.google.com.sa/books?id=IYhSAAAAQBAJ&...

Required:
500 word (One page)
2 credible scholar source
15% similarity allowed.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

See attached. Do let...


Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags