The Stages Of Security Analysis

An analysis can determine if your network is protected from unwanted intrusion. To perform a security analysis you must develop a plan, perform the audit, then report your findings.

  1. Site scans: Test port and application layers against internal defenses

  2. Remote Audits: Test external services from attacks (ISP, Hosts, Servers, Etc)

  3. Penetration Tests: This tests the security of your internet, and checks for risks. There should be specific objectives, requirements, and time frames for the test. You should also take care that you do not intentionally damage the systems and data, and notify the site if there is any vulnerabilities.

  4. IP Testing: Email spoofing, and spamming tests.

Read more: The Stages Of Security Analysis

Story added 13. December 2018, content source with full text you can find at link above.