From the course: Performing a Technical Security Audit and Assessment

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Challenge: Pick the right technical security assessment

Challenge: Pick the right technical security assessment

From the course: Performing a Technical Security Audit and Assessment

Start my 1-month free trial

Challenge: Pick the right technical security assessment

(upbeat music) - [Lecturer] In this chapter, I described multiple types of security assessments and how they are performed differently depending on the viewpoint selected for the test. Now, let's see if you can choose the right kind of assessment to conduct given two scenarios. In the first scenario, your boss asks you to test how vulnerable your organization is to an attack from an internet-based hacker. To simulate an actual unexpected attack, your boss wants you to run the test without notifying the IT or security staff. Given these requirements, which type of security assessment would you select? Your choices are external or internal and overt or covert. In the next scenario, you have concerns about what information a malicious insider could access without authorization, so you design a test that simulates an attacker inside of your network. You want to partner with your organization's IT and incident…

Contents