19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

324<br />

Part VI: Ethical Hacking Aftermath<br />

As part of the final report, you might want to document employee reactions<br />

that you observe when carrying out your ethical hacking tests. For example,<br />

are employees completely oblivious or even belligerent when you carry out<br />

an obvious social engineering attack? Does the IT or security staff completely<br />

miss technical tip-offs, such as the performance of the network degrading<br />

during testing or various attacks appearing in system log files? You can also<br />

document other security issues you observe, such as how quickly IT staff or<br />

manager services providers respond to your tests or whether they respond<br />

at all.<br />

Guard the final report to keep it secure from people who are not authorized to<br />

see it. An ethical hacking report and the associated documentation and files in<br />

the hands of a competitor, hacker, or malicious insider could spell trouble for<br />

the organization. Here are some ways to prevent this from happening:<br />

✓ Deliver the report and associated documentation and files only to those<br />

who have a business need to know.<br />

✓ When sending the final report, encrypt all attachments, such as documentation<br />

and test results, using PGP, encrypted Zip format, or secure cloud<br />

file-sharing service. Of course, hand delivery is your most secure bet.<br />

✓ Leave the actual testing steps that a malicious person could abuse out of<br />

the report. Answer any questions on that subject as needed.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!