Perform Security Assessment Activities

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

35 hours 10 minutes
Video Transcription
Hello and welcome to Siberia's Con Tia, certified of the insecurity practice ners certification papers. Of course,
this is Martin. I'm a nine, which is titled Scared. Any monitoring?
Here are our objectives, which encompasses marginal manana.
Let's not turn our attention toward a discussion of the very first item, which is called Performed security assessment Activities.
Now let's take a look at an object. This and the order was to be covered during this particular
Participate in security, testing, evaluation and lastly interpretation and reporting of scanning and testing results.
Perhaps the best place begin by taking a look at a pre assessment course then, and the question is as follows. In fact, it's a true or false questions. And if statement is testing is the process of exercises Pacific security objectives under specific condition to compare actual and expected behaviors?
If you say let the chew. This is absolutely true. Statement and regards to testing, in fact, is the process off exercising specific security objectives on the specific condition to compare actual and expected behaviors.
The first item on our agenda is every security audits and testing and impress. Acute audit, obviously, is a systematic,
marriageable security audit off how the odors a security policy is employed. Testing, in fact, is the process of exercise of the civic security objectives under specific or specify condition to compare actually inspected behavior. Miniter Testament methods are discussed doing an audit.
An infrared security audit can be internal or perhaps could be external and consists of preparation. Scheduling, evaluation over should perform the audit, and you have a formal response. In other words, a report.
A vulnerable assessment is a risk management process used to identify, quantify and rink possible vulnerability to threats in a given system. It's not isolated to a single field and has applied to system across different industry, such as your I T systems engine, other utility systems, transportation
as well as your communications systems. The key component of a vulnerable assessment is a proper
definition for impact loss rating and the system vulnerable to that specific threat.
Impact laws differ per system, for example, and an excess air traffic control tower may consider a few minutes of downtime as a serious impact loss. While for local government office, those few minutes of impact loss may be negligible.
Finalists Cannon is a security technique used identify security of weaknesses in a computer system.
Bonus cannons can be used by individuals or network administrators for security purposes or could be used by hackers. Attempted ***. Unauthorized access to computer systems. A venomous scan. It is a computer system. Programmed design is assessed. Computers access computers, computer systems. Networks are application
four, obviously weaknesses.
Then we come to penetration tests. A pen tests or penetration test is an attempt to evaluate the security of a nightie infrastructure by safely trying to explore vulnerabilities. Other words were speaking about weaknesses. These bone abilities may exist in operating system service's application flaws,
improper configuration or risk in use of behavior.
Such assessment can also be useful, invalidating the again obviously, the efficiency or effectiveness of your defensive mechanism as what it's in use as here. It's to the various security policies that you have in place.
Ape interesting tests typically performed using manual automated technologies to systematically compromise service in points Web applications. While it's network's network devices, mobile devices and other potential points of exposure,
once vulnerable is have been successful exploded on a particular system test is the attempt to use the compromise system tau launch the prince your exploits at other internal resource is, but simply by trying to incrementally achieve high levels of security clearance and deeper access to electronic assets. And it may should be of what we call
privilege escalation.
Obviously, there's a benefits when you engage in what we call penetrates and testing. First of all,
you're able to intelligent manager bon ability. You can avoid the cost of network downtime. You can meet regulatory requirements and avoid fines you can also prefer deserve the actual corporate image as well as your customers lore. Laurenti as well
as you can see obtaining a Pinterest and testing software or hiring a pen tester to test your network, is a proactive effort or protecting your network and Venice from risk. Before the attack or security breach occur, the printers and tested shipping performed on a regular basis. To ensure consistency,
a pen tester will reveal how newly discovered threats are emerging. Volunteers may potentially be actually utilize or at here to buy
Attackers. In addition to regulate schedule, analysis and assessment required by regulatory mandates test you also run whatever. For example, when you have a new infrastructural application at it, when you have significant upgrades or modifications. New office locations or establish security patches
or applied
and in use of policies have been modified.
This place is to oppose assessment question,
and the question is as follows in fact, is a true and false question.
Varma Scanner is a security technique used Identify security witnesses in the computer system.
If you say let the truth, that's absolutely correct, because bonus can. It is, in fact, a security technique used. Identify security weaknesses in the computer system.
Doing this particular presentation, We particularly highlighted participates and executed testing and evaluation as well as interpretation and reporting off scanning and testing results.
In our upcoming video, we've taken a look at operate and maintain Martin Systems. Look forward to seeing, you know, very Lexx video.
Up Next