KEY CONCEPTS

Penetration testing is typically deployed to gain an assessment of IT infrastructure, networks and business applications to identify attack vectors, vulnerabilities and control weaknesses. It involves an active analysis of the target system for any potential vulnerabilities that could result from poor or improper system configuration, both known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures.

Image   Penetration testing looks to exploit known vulnerabilities but should also use the expertise of the tester to identify specific weaknesses – unknown vulnerabilities – in an organisation’s ...

Get Procuring Penetration Testing Services now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.