Penetration tests Risk of security loopholes in IT networks



Similar documents
5.5. Penetration Tests. Report of the Auditor General of the Ville de Montréal to the City Council and to the Urban Agglomeration Council

Ethical Hacking and Penetration Testing Presented by: Adam Baneth Managing director

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Goals. Understanding security testing

NIST National Institute of Standards and Technology

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:

ESKISP Manage security testing

Pentests more than just using the proper tools

Pentests more than just using the proper tools

Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance

How DataSunrise Helps to Comply with SOX, PCI DSS and HIPAA Requirements

SCOPING QUESTIONNAIRE FOR PENETRATION TESTING

A Study on the Security aspects of Network System Using Penetration Testing

Penetration Testing and Vulnerability Scanning

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Payment Card Industry (PCI) Data Security Standard

Guidelines for Web applications protection with dedicated Web Application Firewall

Risk Management Guide for Information Technology Systems. NIST SP Overview

Penetration Testing Service. By Comsec Information Security Consulting

Why does web security testing fail globally? Problems and suggested solution.

Annex B - Content Management System (CMS) Qualifying Procedure

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

The McAfee SECURE TM Standard

Why we Need Standards for Breaking the Smart Grid

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

No.Ed.CIL/IS Unit/It Security/2014/1..April, Quotation for Security Audit for EdCIL house IT infrastructure.

An ICS Whitepaper Choosing the Right Security Assessment

Information Security: A Perspective for Higher Education

Compliance Services CONSULTING. Gap Analysis. Internal Audit

Cautela Labs Cloud Agile. Secured.

IDS and Penetration Testing Lab ISA 674

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

Computer Security: Principles and Practice

LCM IT Asset Management

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:

Scoping Questionnaire for Penetration Testing

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

ASDI Full Audit Guideline Federal Aviation Administration

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Web App Security Audit Services

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Cyber R &D Research Roundtable

encription IT Security and Forensic Services

Penetration Testing in Romania

Security and Vulnerability Testing How critical it is?

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

Network Security Audit. Vulnerability Assessment (VA)

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy.

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Project Update December 2, Innovation Grant Program

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Put into test the security of an environment and qualify its resistance to a certain level of attack.

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Penetration Testing Scope Factors

Information Technology Security Review April 16, 2012

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

Passing PCI Compliance How to Address the Application Security Mandates

HTExploit: Bypassing htaccess Restrictions

Position Description University Information Security Officer Miami University

Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT

encription IT Security and Forensic Services

IY2760/CS3760: Part 6. IY2760: Part 6

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Security Audit VIS Central System. Summary Report

DEPARTMENT OF MEDICAL ASSISTANCE SERVICES VULNERABILITY ASSESSMENT AND NETWORK PENETRATION TEST JUNE 2009

Addendum #2 Date: March 10, City of Memphis Network Penetration Services. RFQ # SAIC CoM 2014 RG R Issue Date: January 31, 2014

HomeConvenience.com. Creating Trust Online CASE STUDY. Comodo Identity and Trust Assurance Suite. Content Verification Certificate.

INTRODUCTION TO PENETRATION TESTING

Integrated Threat & Security Management.

locuz.com Professional Services Security Audit Services

Introduction to Penetration Testing Graham Weston

Western Australian Auditor General s Report. Information Systems Audit Report

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

Evaluation Report. Office of Inspector General

Office of Inspector General

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Third-Party Access and Management Policy

Guide for the attention of developers/hosts for merchant websites on the minimum level of security for bank card data processing

PCI DSS 3.1 and the Impact on Wi-Fi Security

Enabling Continuous PCI DSS Compliance. Achieving Consistent PCI Requirement 1 Adherence Using RedSeal

How To Check If A System Is Secure

OFFICIAL USE ONLY. Department of Energy. DATE: January 31, 2007 Audit Report Number: OAS-L-07-06

2016 OCR AUDIT E-BOOK

Panel: SwA Practices - Getting to Effectiveness in Implementation

How To Audit Telecommunication Services And Enterprise Security

HUMAN RESOURCES MANAGEMENT NETWORK (HRMN) SELF-SERVICE

Security Control Standard

Document ID. Cyber security for substation automation products and systems

Transcription:

Penetration tests Risk of security loopholes in IT networks

Penetration tests Risk of security loopholes in IT networks Unauthorized access to the systems and data of your company, loss of expertise, and violation of legal provisions are just some of the potential consequences of insufficient safeguarding of internal and external networks. Most companies are unaware of the damage that can be caused by this. To reduce these risks and ensure an essential level of security and functionality, your company can have the security of existing IT systems checked on the basis of penetration tests.

Why penetration tests? To establish how secure your company is To raise the level of IT security To comply with legal provisions and regulations for the protection of information within the company What will you receive? An assessment of the security of your company and a presentation of the risk potential of the penetrated environment from the point of view of a hacker Increased security of your technical systems and infrastructure - Identification of vulnerabilities and security problems - Checking of implemented security measures - Recommendation of measures to address identified vulnerabilities - Recommendations regarding compliance of your IT security - Proposals for optimization of IT security guidelines Verification of IT security by an external third party

Penetration test areas Two test methods are generally distinguished in the context of penetration tests. Black box tests A black box test simulates an external attack initiated by a person outside the company. The aim is to identify specific security loopholes that can be exploited without any insider knowledge. White box tests In the case of a white box test, the attack is simulated based on the detailed knowledge of an employee. The aim is to identify potential vulnerabilities as well as to check internal IT security concepts. Preparation Information base (black or white box) Aggressiveness (passive to aggressive) Scope (complete to focused) Starting point (from inside or outside) Black box tests White box tests External View of an external hacker without insider knowledge View of an external with insider knowledge (e.g., access data for Web shop) Internal View of an external employee without company authorizations View of an internal employee with extensive knowledge

Execution Kickoff and information procurement Agreement of execution period Clarification of legal matters Definition of tools to be employed Specification of reporting structures Information procurement and evaluation Assessment of information/risk analysis Analysis and identification of vulnerabilities Scanning (e.g.: TCP/UDP scan) Active penetration tests Interpretation of vulnerabilities Analysis of facts and agreement of subsequent procedure Documentation and closing discussion Report generation and discussion Documentation of procedure and methodology of executed process steps Documentation of identified vulnerabilities Risk assessment of identified vulnerabilities Detailed recommendations regarding subsequent procedure

Individual not standard The IT systems and processes within a company are very different, with structures and technical organizations playing an essential part in their formation and individual configuration. It therefore makes little sense to execute penetration tests according to a fixed, uniform system. Quite the contrary in fact: a test should be as flexible as possible so that it can be adapted to the decisive criteria. We perform individual, targeted penetration tests based on the perspective from which they are to be executed, the aggressiveness and specific procedure of the test sequence, the scope of the systems to be examined, and the information base provided. Curious to learn more? Why not contact us for an individual quote. sales@ibs-schreiber.de Further information on penetration tests can be found at www.ibs-schreiber.de

IBS Who we are Founded on July 1, 1979 as "Ingenieurbüro Schreiber" (Schreiber Consulting Engineers), the company now presents itself as IBS Schreiber GmbH International Business Services for auditing and consulting. More space for more service IBS now comprises four business areas, consisting of our audit seminars and professional conferences, auditing and consulting services, CheckAud audit software, and services in the field of data protection. Our references include well-known companies in virtually every sector: banks, insurance, research, public authorities, manufacturing industry, media, auditors, and consultants these are just some of the many areas covered by our ever growing customer base. To us, up-to-dateness, a willingness to learn, and further development are not just means to an end, but instead represent core elements of our company values as instruments of innovation.

IBS Schreiber GmbH International Business Services for auditing and consulting Zirkusweg 1 20359 Hamburg, Germany Telephone: +49 40 69 69 85-15 Fax: +49 40 69 69 85-31 www.ibs-schreiber.de info@ibs-schreiber.de