Cyber security risk
Cyber Security Risk = f(Threat, Vulnerability, Impact)
high-level penetration testing process
Scoping
The main aim of penetration test is to find all vulnerabilities within a given scope.
Before proceeding with any hacking, the cyber security organisation and their client must
both be clear on:
* What is going to be tested
Cyber attack
Techniques and methodology depend highly on the outcome of scoping
It may be based on a particular technology, against a target of limited scope, or exclude pertinent techniques
Target may be infrastructure (servers, services, etc.), a website, a mobile app,
hardware, a physical building, or a person
Certain techniques may be prioritised based on the goal of the test
Reporting
The value of a penetration test is all in the report
Recipient of the penetration test report can be anyone from business owner (non-specialist) to technical staff who have to implement the recommended changes (specialist)
The types of offensive security testing
Vulnerability scanning
Penetration testing
Red teaming