Systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation. Vulnerability assessments use the technology concerned with scanning computer systems and networks in order to find security vulnerabilities.
The portion of security testing in which the evaluators attempt to circumvent the security features of a system. The evaluators may be assumed to use all system design and implementation documentation, which may include listings of system source code, manuals, and circuit diagrams. The evaluators work under the same constraints applied to ordinary users.
A penetration test is similar in scope to a vulnerability assessment but is usually more aggressive in its efforts to simulate an attack. Vulnerability tests can be thought of as directed toward a single vulnerability, or a group of related vulnerabilities. A penetration test is expected (at least initially) to take place from a vantage point that is external to the network. Vulnerability assessments and analyses are assumed to be covering particular areas. These areas may be either external or internal, and either host based or network based.
Frequently, during penetration tests, certain things might be discovered that affect the continuing assessment. The customer and assessment team should have agreed in advance on various issues so that this questions will not have to be answered in the heat of the moment. These rules should include the following questions:
The process of formally evaluating the degree of threat to an information system. It describes the nature of the threat, and may provide specific suggestions for countermeasure to the threat, if countermeasures exist.
Audit reports supply information as to potential areas to examine for security concerns, but care must still be taken to perform the necessary steps to secure your network.
An executive summary provides a high level overview of the status of the system and the key recommendations of the report.
Following this, a broad overview of the scope of the system is presented and discussed.
Next, general issues of environment, IT management, and key roles are discussed.
The network has been broken up into key functional segments. Each segment is then examined in detail for flaws. Each segment comprises a section containing a discussion of the following topics:
The Corrective Actions presented throughout the body text are organized by priority, and presented in an appendix.
1. Site Audit Version 01.20, Geoff Halprin, The SysAdmin Group
Last modified: Sat Oct 30 22:44:01 PDT 2004