Class Read 41: Reconnaissance - taylortommy23/401-Reading-Notes GitHub Wiki

How are the stages of a pen test very similar to those of the Cyber Kill Chain?

  • Planning and Gathering Info: Both gather information about the target.
  • Scanning and Preparing: Pen tests scan for vulnerabilities similar to attackers preparing their attack.
  • Exploiting Weaknesses: In pen tests we exploit vulnerabilities like attackers exploiting weaknesses.
  • Maintaining Access: Aim to keep access to the system.
  • Assessing Impact: Assess the impact of the attack or test.

Your manager has asked you to explain the benefits of a pentest to the company’s leadership. How would you lead this conversation?

I would explain to my leadership the following benefits of penetration testing, which are the following:

  • Find and Fix Issues: It helps us find and fix problems before bad actors can use them.
  • Meet Rules: We meet industry rules and regulations, avoiding penalties and showing we take security seriously.
  • Protect Data: It safeguards sensitive data like customer information.
  • Prepare for Incidents: It helps us get ready for real attacks by testing our response.
  • Save Money: It's cost-effective, preventing expensive data breaches.
  • Raise Awareness: It makes our staff more security-aware.
  • Keep Getting Better: Pen testing is ongoing, keeping us ahead of evolving threats.

References:

https://www.imperva.com/learn/application-security/penetration-testing/