Posted: November 4th, 2022
Place your order now for a similar assignment and have exceptional work written by our team of experts, At affordable rates
answer the following questions as though you were an internal or external penetration test firm assisting a Saudi company in strengthening their systems, framework, and network.There is a considerable amount of confusion in the industry regarding the differences between vulnerability scanning and penetration testing, as the two phrases are often used interchangeably. However, their meaning and implications are very different. A vulnerability assessment simply identifies and reports noted vulnerabilities, whereas a penetration test (Pen Test) attempts to exploit the vulnerabilities to determine whether unauthorized access or other malicious activity is possible.
Penetration testing typically includes network penetration testing and application security testing; it also includes controls and processes around the networks and applications and should occur from both outside the network trying to come in (external testing) and from inside the network.
Given this information, review the two links on how Kali Linux is often used in penetration testing, the tools it contains, and how it can assist a penetration tester to identify vulnerabilities in the network:
Once you have done that, answer the following questions as though you were an internal or external penetration test firm assisting a Saudi company in strengthening its systems, framework, and network.
How does the penetration test differ from other types of security testing—such as a vulnerability assessment?
What is your process for performing the penetration test?
Discuss the process and tools that would be used.
How will you protect the data during and after testing?
How will you ensure the availability of the systems and services while the test is taking place?
These last two will be key. Unless you are performing the penetration test when their users are not active, it will be necessary to catalog how you will do this without disrupting business or destroying data.
Your paper is required to be 5 pages in length, not including the title and reference pages, and should cite at least one scholarly resource other than the course materials. It should follow academic writing standards and APA style guidelines, as appropriate.
Place an order in 3 easy steps. Takes less than 5 mins.