From the course: Performing a Technical Security Audit and Assessment

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Solution: Pick the right technical security assessment

Solution: Pick the right technical security assessment

From the course: Performing a Technical Security Audit and Assessment

Start my 1-month free trial

Solution: Pick the right technical security assessment

(upbeat music) - [Instructor] Let's see if you selected the correct security assessments for the scenarios. In the first scenario, because you're testing how vulnerable your organization is to an internet-based hacker, you'd want to conduct an external assessment. This means that you'll test the strength of your organization's perimeter defenses. And since this security assessment will be done without the knowledge of the IT or security staff, that makes this a covert task. In the second scenario, simulating a malicious insider means that this will be an internal security assessment. You'll focus on testing internal systems for vulnerabilities, and by giving advance notification to your organization's IT and incident response teams, that makes this an overt task. The next time you need to conduct a security assessment, you can compare it to these scenarios to help you decide which type of assessment is best.

Contents