This website uses technical cookies, analytics and Third party Cookies to enhance user experience. Clicking on "I Accept" you will accept all cookies.

Privacy | Cookie Policy

AnĂ¡lise de vulnerabilidades

What are vulnerability analysis and PenTest for? Both are used to detect risks and possibilities of system failures. Risks can be generated, for example, by errors in programming or configuration of systems and by intentional or unintended human failures, such as the execution of malicious files, viruses or ransomware.
What are vulnerability analysis and PenTest for?
Both are used to detect risks and possibilities of system failures. Risks can be generated, for example, by errors in programming or configuration of systems and by intentional or unintended human failures, such as the execution of malicious files, viruses or ransomware.

What these procedures do is to ensure that system vulnerabilities are detected. They are carried out periodically so that professionals can devise solutions for potential risks.

Vulnerability Analysis x PenTest: What are the differences between them?

Vulnerability analysis identifies vulnerabilities in a network or system. The result of this procedure is a list of the main threats, usually listed by severity or criticality in relation to the business.

There are 3 forms of vulnerability assessment and PENTEST.
White Box

In this type, all information from the company's network, servers, systems and databases is passed on to the test runner. These include IP addresses, settings and access credentials.

Black Box

No information about the systems is passed on to the test analyst. That is, it is a simulation of a real hacker attack, where the attackers have no relationship with the company.

Gray Box

Chosen the most efficacy and best cost benefit

It is a kind of mixture of the two previous modalities. Some information is provided to the tester, but the system settings are not completely shared with that professional. You can test, for example, as if you were an ordinary user who, despite being accredited to the network, has limited permissions.

How is a vulnerability analysis performed?
The vulnerability analysis is performed using automated tools, environment observation and interviews and is divided into 5 steps:

Risk identification and assessment.
Identification and Assessment of vulnerabilities.
Evidence collection.
Analysis and diagnosis
Reporting
Company
Braga e Fontes - PROLINX

BRA - We are an integrator of solutions in Information Technology that always seeks excellence in our processes and service.

Categories
Agribusiness
Sustainable energy, solutions for "smart cities"
Manufacturing, automation and industry 4.0
Company
Braga e Fontes - PROLINX

BRA - We are an integrator of solutions in Information Technology that always seeks excellence in our processes and service.

Categories
Agribusiness
Sustainable energy, solutions for "smart cities"
Manufacturing, automation and industry 4.0