1) Network scanning
2) Vulnerability scanning
3) Password cracking
4) Log review
5) Integrity checkers
6) Virus detection
7) War dialing
8) War driving (wireless LAN testing)
9) Penetration testing
In actual practice combination of many such techniques may be used to have a more comprehensive assessment of the overall security aspect.
No comments:
Post a Comment