As organizations become more open, adequately protecting an organization's information assets becomes a business imperative. Managing computer and network security has become an increasingly difficult and challenging job. Recent advancements in computing and communications technology have made organizations re-think their overall information/risk management strategy. As a result, companies now feel the need for monitoring and assessing overall security on a more widely dispersed level.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
This series explores penetration testing, an ethical hacking technique, to help security professionals evaluate the effectiveness of information security measures within their organizations.
Part 1: Reasons to perform a penetration test
Part 2: Performing a penetration test
Part 3: Penetration testing strategies
Part 4: Types of testing
Part 5: Test methodology and standards
Puneet Mehta is a Security Architect, at SDG Corporation, an e-security consulting and an e-business software services and solutions firm headquartered in Connecticut.
Puneet is also a valuable member of the expert panel on SearchNetworking.com answering member questions about network security. He has also published several popular articles: