Automated vs. Manual
Automated and manual penetration testing can be both used as a means to evaluate an organization’s security controls system. Automated testing has been the mainstream approach adopted by organizations because of the rapid technological changes to provide economies of scale compared to manual one. A thorough manual testing may consist of several weeks with an investment of thousands of dollars, whereas an automated can perform the tests within several hours with reduced costs. This shows that automated tools can be more cost-effective and efficient if conducted properly. Another benefit of automation is that organizations can perform these tests as frequent as they want compared to ethical hacking practitioners who conduct testing only during working hours.
On the other hand, there can be an overreliance and false sense of security on automated tools because they do not guarantee that it will catch 100% of the security gaps in the system and are only as effective as the individuals who programmed and run these tests. In other words, there is a risk that an untrained employee who handles and manages the automated testing can cause more damages to the organization than the expected benefit. Furthermore, an automated testing lacks the flexibility of substituting different scenarios as compared to an extensive manual testing performed by a knowledgeable and experienced ethical hacking practitioner.
An example of a company who performs automated penetration testing is iViz, the first cloud-based penetration testing that provides high quality of services for applications with “on-demand SaaS experience”. The benefits include the use of artificial intelligence to simulate all types of intrusion attacks, a zero false positive with the aid of “business logic testing and expert validation”, the flexibility to conduct a penetration test at any time, no required software or hardware, the scalability and the cost- subscription model. In comparison of Sales-force to customer relationship management, iViz has performed the same transformation to penetration testing.
External vs. Internal
As identified above, testing should be conducted to address the internal and external threats. Internal testing is performed within the organization’s system and simulates what an authorized user or employee could potentially act. On the other hand, external testing attempts to simulate what an external hacker could potentially harm from outside the system. The red team would conduct intrusion attacks on the organization’s network system through the use of the Internet or Extranet25. The red team generally targets the organization’s servers or devices, such as “Domain Name Server, email server, web server or firewalls”. It appears that an internal testing may be more comprehensive because an authorized user can either use the internal or external system to hack into an organization’s information system.
Blind vs. Double-Blind vs. Targeted Testing
In a blind testing environment, the red team is only provided with publicly available information, such as the organization’s website, domain name registry and any other related discussion boards on the Internet. With this limited information, penetration testing attempts to accumulate information to exploit an organization’s security weaknesses. It can reveal information about an organization that it would not have known, but can be more time-consuming and expensive due to the extensive effort to conduct research prior to the testing phase.
In a double-blind testing environment, the blind testing process is expanded in which the organization’s IT and other staffs are not informed beforehand about the intended testing activities. Hence, they are also considered “blind” to the test. In this type of scenario, very limited people within the organization are aware of the testing, and it requires continuous monitoring by the project sponsor to ensure that the testing procedures can be eliminated once the objective has been attained. Furthermore, this test can reveal the effectiveness of an organization’s monitoring, identification and response procedures to incidents.
In a targeted testing environment, the organization’s IT and other staffs are notified about the testing activities beforehand and the penetration testers are provided with network design layout and other related information. This type of scenario may be more efficient and cost-effective because it tends to be less time-consuming than both the blind and double-blind testing. However, it may not offer a “complete picture of an organization’s security vulnerabilities and response capabilities”.
No comments:
Post a Comment