19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

350<br />

Part VII: The Part of Tens<br />

Ethical Hacking Combines the Best<br />

of Penetration Testing and<br />

Vulnerability Assessments<br />

Penetration testing is rarely enough to find everything in your systems<br />

because the scope of traditional penetration testing is simply too limited. The<br />

same goes for vulnerability assessments that mostly involve security scans.<br />

Ethical hacking combines the best of both and gets you the most bang for<br />

your buck.<br />

Ethical Hacking Can Uncover<br />

Weaknesses That Might Go<br />

Overlooked for Years<br />

Ethical hacking not only uncovers technical, physical, and human weaknesses,<br />

but it can also reveal problems with IT and security operations, such as<br />

patch management, change management, and lack of awareness, which may<br />

not be found otherwise.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!