There are two major types of Network Security Assessments:
1. (Vulnerability Assessment) – Basic Security Audit
This is designed to look at the security of your network from either the inside and/or outside of the network and produce reports based on the weaknesses of parts of the network, and the network as a whole. This assessment will highlight areas of risk and will advise which changes will need to be made.
2. (Pen Test) – Penetration testing
We simulate high-impact security breaches to help organizations better understand real security risks
This audit includes the capabilities of the Vulnerability Assessment mentioned above, plus more comprehensive external, internal, and social testing. (The social testing in itself explores, as the expression implies, examination and discussion of staff methodologies and habits). When the Pen Test finds vulnerabilities in the network, it can run software that delivers a ‘payload’; this helps to reveal weak links in the system. If a hacker can deploy a payload with harmful code, they could take control of segments and potentially expose the entire network. A Pen Test is performed in order to help prevent this from happening, by finding such vulnerabilities first and then, with the client’s permission, actively exploiting them.