Cyber Security & Penetration Testing



  • 0 0Votes
  • 18 Oct 2019 @ 12:22
  • 0


  • 1 Min

A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.[1][2] The test is performed to identify both weaknesses (also referred to as vulnerabilities), including the potential for unauthorized parties to gain access to the system's features and data,[3][4] as well as strengths,[5] enabling a full risk assessment to be completed.

The process typically identifies the target systems and a particular goal, then reviews available information and undertakes various means to attain that goal. A penetration test target may be a white box (which provides background and system information) or black box (which provides only basic or no information except the company name). A gray box penetration test is a combination of the two (where limited knowledge of the target is shared with the auditor).[6] A penetration test can help determine whether a system is vulnerable to attack if the defenses were sufficient, and which defenses (if any) the test defeated.[7][5]

You may also like

Blockchain Solutions

We build production-grade blockchain applications for our clients ranging from NFT marketplaces and…

Blockchain Consultancy in Niche

Here the content

New Report