penetration testing
Download
Skip this Video
Download Presentation
Penetration Testing

Loading in 2 Seconds...

play fullscreen
1 / 12

Penetration Testing - PowerPoint PPT Presentation


  • 159 Views
  • Uploaded on

Penetration Testing. Lyndsey Naquin Tyler Pourciau Ryan Sandel Jessica Witcher. What is it?. VS. 6 Main Types of Penetration Testing. wireless. Find wireless sharing broadcast from inside locked buildings to the outside Look for unprotected networks that should not be visible .

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Penetration Testing' - maddy


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
penetration testing

Penetration Testing

Lyndsey Naquin

Tyler Pourciau

Ryan Sandel

Jessica Witcher

wireless
wireless
  • Find wireless sharing broadcast from inside locked buildings to the outside
  • Look for unprotected networks that should not be visible
internal
internal
  • Attempting to break through network securities from inside the organization’s network
  • Examples
    • Falsify records
    • Utilize company computers
external
external
  • Attempting to break through network securities from outside the network
  • Examples
    • Firewall
    • Server
    • Router
web applications
Web applications
  • Attempting to circumvent general and application controls of a web-based application
  • Examples
    • Shopping carts
    • Client Portals
social
social
  • Penetrating the human barriers of an environment
  • Examples
    • Card Swipes
    • Phone Calls
    • Misappropriated passwords
physical
physical
  • Attempting to penetrate physical security barriers and ascertain the extent of possible damage.
  • Examples
    • Holes in fence
    • Security guards asleep
main goal
Main Goal

To determine if unauthorized access to key systems and files can be achieved

sources
Sources
  • http://www.penetration-testing.com/home.html
  • http://www.veracode.com/security/penetration-testing
  • http://www.right-click-online.com/fast-facts-how-penetration-testing-can-help-your-business/
ad