Pen-Test

Penetration test (Pen-test)
By the computer knowledge progress, besides hardware and software networks, threats including: passwords detection, systems at risk viruses, loss of data, change data by unauthorized persons  and their penetration to networks and computer systems  threaten organizations.
Penetration test is network and computer systems security assessment process that simulate an attack by a hacker. The most important difference between the hacker and the person who performs penetration test is that penetration test conducted by the authorization or approval and it is done as a report to be presented.
Pen-test types
Black Box: In this type of testing to assessor located at the situation outside the organization’s network and using the knowledge and the right tools, try to detect practical applications vulnerability.(In this type of penetration test the information will not give to the assessor by the organization and he has no idea about the purpose of penetration test.)
White Box: In this type of test the assessor by knowing the system and review the codes, also internal organization’s network, detects practical applications and network vulnerabilities.(In this type of penetration test the information will give to the assessor by the organization and he has knowledge about the purpose of penetration test.)
Grey Box: This type of test is between the two types of above tests.
Some advantages of Pen-test
• Identify ways to infiltrate the organization(Security breaches)
• Identify threats and vulnerabilities in the organization
• Increase the security factor