From the course: Performing a Technical Security Audit and Assessment

Unlock the full course today

Join today to access over 24,800 courses taught by industry experts.

Solution: Pick the right technical security assessment

Solution: Pick the right technical security assessment

From the course: Performing a Technical Security Audit and Assessment

Solution: Pick the right technical security assessment

(upbeat instrumental music) - [Instructor] Let's check if you made the right choices for the scenarios. In the first scenario where the goal is to assess vulnerability to an internet-based hacker attack, you should conduct an external assessment. This involves testing your organization's perimeter defenses, and since this security assessment will be done without notifying the IT or security staff, it falls under the category of covert testing. In the second scenario, simulating a malicious insider, and internal security assessment is what you should choose. Here the focus is on testing internal systems for vulnerabilities and providing advanced notice to your organization's IT, and incident response teams makes it an overt test. The next time you need to conduct a security assessment, you can refer to these scenarios to guide you in selecting the most suitable type of assessment.

Contents