Download presentation
Presentation is loading. Please wait.
Published byLisa Briggs Modified over 9 years ago
1
encription IT security services THE VALUE OF PENETRATION TESTING FOR DIAGNOSTIC PURPOSES
2
encription IT security services WHO ARE WE???
3
encription IT security services WHAT WE WILL SHOW YOU How the malicious hacker works A hacker in action Penetration Testing/Ethical Hacking – What is it? Questions
4
encription IT security services IT WON’T HAPPEN TO ME The Web Developer Internet connection scanned every 3 minutes May already have a problem – Trojans
5
encription IT security services WHY The Data Protection Act Payment Card Industry (PCI DSS) Financial Reporting Standards Financial Services Act Good Governance and common sense
6
encription IT security services THE MALICIOUS HACKER Their Raison d’etre Anywhere in the World Completely indiscriminate Now targeted and organised
7
encription IT security services A HACKER IN ACTION
8
encription IT security services WHAT IS A PENETRATION TESTER? Has permission Is trusted Is qualified Keeps up to date
9
encription IT security services TYPES OF TESTING Black/White Box External Internal Social Engineering Forensics
10
encription IT security services THE OUTPUT A Report Fixes/support/advice & guidance On-Going – There for you
11
encription IT security services WHAT TO TEST AND WHEN? Web Site IT Infrastructure (Network) Applications PDA’s/Laptops People Suppliers/Partners
12
encription IT security services WHAT WE HAVE SHOWN YOU How the malicious hacker works A hacker in action Penetration Testing/Ethical Hacking – How it works
13
encription IT security services for Your Security 0330 100 2345 www.encription.co.uk Give us a call
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.