Vulnerability Assessment Vs Penetration Testing - PowerPoint PPT Presentation

About This Presentation
Title:

Vulnerability Assessment Vs Penetration Testing

Description:

Penetration Testing is more aggressive and intrusive, it goes a step further and involves trying to technically break into the client systems or servers to prove they are vulnerable. However, in our experience, we have found that most clients only require a comprehensive Vulnerability Assessment and not the more intrusive Penetration Test. – PowerPoint PPT presentation

Number of Views:867

less

Transcript and Presenter's Notes

Title: Vulnerability Assessment Vs Penetration Testing


1
There seems to be a certain amount of confusion
within the Information Technology arena about the
differences between Penetration Testing and
Vulnerability Assessment.
Vulnerability Assessment Vs Penetration Testing
2
The Confusion between Penetration Testing vs.
Vulnerability Assessment
They are often classified as the same thing, when
in fact they are not. Penetration Testing is more
aggressive and intrusive, it goes a step further
and involves trying to technically break into the
client systems or servers to prove they are
vulnerable. However, in our experience, we have
found that most clients only require a
comprehensive Vulnerability Assessment and not
the more intrusive Penetration Test.
The inherent risk is that a Penetration Test, by
potentially exploiting flaws in the client
software or operating system, can cause
instability when testing production
environments. However, if Penetration Testing is
required, we carefully understand and consider
all factors to avoid performance issues.
3
The Penetration Test
  • A Penetration Test is a method of evaluating the
    security of a computer system or network by
    simulating an attack by a malicious hacker. The
    process involves an active analysis of the system
    for any weaknesses, technical flaws or
    vulnerabilities.
  • This analysis is carried out from the position of
    a potential attacker and can involve active
    exploitation of security vulnerabilities. Any
    security issues that are found will be presented
    to the system owner, along with an assessment of
    impact and typically with a proposal for
    mitigation or a technical solution.

4
The Vulnerability Assessment Vulnerability
Assessment is a broad term that is often applied
to various things it is closely related to a
Risk Assessment which is part of Business
Continuity Planning and Disaster Recovery
Development. But at the core, Vulnerability
Assessments involve the process of identifying
and quantifying technical vulnerabilities in a
system, known as exploits. These exploits put the
system at risk.
5
PCI-DSS ASV scanning
  • In addition to standard assessments, Interactive
    Security can meet the more complex requirements
    of PCI-DSS ASV scanning. We also offer
    comprehensive Penetration Test and Vulnerability
    Assessment report reviews for clients with more
    specific concerns.

6
THANKYOU for reading
Interactive Security, Inc.
  • https//intactsec.com

Headquarters in the Greater Philadelphia Area
1 (267) 824-2500
sales_at_intactsec.com
Write a Comment
User Comments (0)
About PowerShow.com