Penetration Testing (Pen-Testing)
Penetration testing (pen-testing or pentesting) is a method of testing, measuring and enhancing established security measures on information systems and support areas.
Pen-testing may be conducted to complement background investigations and ensure social engineering and networking safety.
Pen-testing is implemented by simulating malicious attacks from an organization’s internal and external users. The entire system is then analyzed for potential vulnerabilities. A plan that communicates test objectives, timetables and resources is developed prior to actual pen-testing.
Pen-testing is an invaluable process for a number of reasons, including the following:
Minimal security breach potential ensures system reliability.
Complies with regulatory or other agencies.
Demonstrates a good-faith effort to protect customer information
Pen-testing tools include:
Commercial off-the-shelf (COTS) or prebuilt equipment and/or software applications
Proprietary enterprise applications (EA)
Potentially compromisable phone and wireless systems