Testing is divided into external and internal:
Posted: Tue Jan 07, 2025 9:13 am
In May of this year, one of these attacks stopped the work of SDEK for several days. Evgeny Sobolev, director of Practical Security Lab, spoke about non-trivial ways to protect against cybercriminals.
Subscribe to RB.RU in Telegram
An Overview of Unconventional Cybersecurity Testing Methods
Companies conduct diagnostics of the IT component of the business to understand the level of data security. There are two main ways:
audit of documents: policies and procedures;
penetration testing - pentest.
Penetration testing allows you to check the state of taiwan whatsapp phone number information security of a company, identify vulnerabilities and shortcomings. The most interesting methods to check the strength of a company's IT security are associated with penetration testing.
Internal simulates an attacker acting inside the company. For example, an insider planted by a competitor, an offended employee before being fired, or an innocent specialist whose computer is infected with a virus. Or a hacker who has overcome the external security perimeter and gained access to the internal network from the Internet.
External testing simulates the actions of a hacker acting via the Internet to gain access to the company's internal network. This also includes other types of attackers acting from the outside of the organization. For example, through social engineering, sending emails and spam calls, studying WiFi networks around the office, or penetrating you under the guise of a client or partner with special equipment.
The company can conduct the test on its own. Then the hacking is done by the same specialists who, in fact, built the protection. The test may be ineffective: to find loopholes, you need a fresh look.
The company can also turn to white hat hackers (pentesters) — legal hacking specialists. Their non-standard testing methods help test the system unnoticed by the company's employees. The more unnoticeable the test, the greater the chance of getting reliable results.
Free up your time and earn more with AI! Take the course and get the best solutions for solving business problems as a gift.
Subscribe to RB.RU in Telegram
An Overview of Unconventional Cybersecurity Testing Methods
Companies conduct diagnostics of the IT component of the business to understand the level of data security. There are two main ways:
audit of documents: policies and procedures;
penetration testing - pentest.
Penetration testing allows you to check the state of taiwan whatsapp phone number information security of a company, identify vulnerabilities and shortcomings. The most interesting methods to check the strength of a company's IT security are associated with penetration testing.
Internal simulates an attacker acting inside the company. For example, an insider planted by a competitor, an offended employee before being fired, or an innocent specialist whose computer is infected with a virus. Or a hacker who has overcome the external security perimeter and gained access to the internal network from the Internet.
External testing simulates the actions of a hacker acting via the Internet to gain access to the company's internal network. This also includes other types of attackers acting from the outside of the organization. For example, through social engineering, sending emails and spam calls, studying WiFi networks around the office, or penetrating you under the guise of a client or partner with special equipment.
The company can conduct the test on its own. Then the hacking is done by the same specialists who, in fact, built the protection. The test may be ineffective: to find loopholes, you need a fresh look.
The company can also turn to white hat hackers (pentesters) — legal hacking specialists. Their non-standard testing methods help test the system unnoticed by the company's employees. The more unnoticeable the test, the greater the chance of getting reliable results.
Free up your time and earn more with AI! Take the course and get the best solutions for solving business problems as a gift.