Translate

Thursday 4 December 2014

QUESTIONS TO ETHICAL HACKERS

  1. What can the intruder see on the target system?
  2. What can intruder do with that information?
  3. Does anyone at the target notice the intruder's attempts or successes?
  4. If all the components of information system are adequately protected, updated and patched
  5. How much effort, time, and money is required to obtain adequate protection?
  6. Does the information security measures are in compliance to industry and legal standards?

No comments:

Post a Comment