MDIS Blog

Main Menu

MENUMENU
  • Home
  • Topics
        • Business & Management
        • Career Management
        • College
        • Engineering
        • Event
        • Fashion & Design
        • Health & Nursing
        • Information Technology
        • Languages
        • Life Sciences
        • Lifestyle
        • MDC
        • Media & Communications
        • Psychology
        • Safety Management
        • Tourism & Hospitality
        • Uncategorized
  • Campus
  • Student Life
  • Preview Sessions
  • + Become A Contributor

logo

Header Banner

MDIS Blog

MENUMENU
  • Home
  • Topics
        • Business & Management
        • Career Management
        • College
        • Engineering
        • Event
        • Fashion & Design
        • Health & Nursing
        • Information Technology
        • Languages
        • Life Sciences
        • Lifestyle
        • MDC
        • Media & Communications
        • Psychology
        • Safety Management
        • Tourism & Hospitality
        • Uncategorized
  • Campus
  • Student Life
  • Preview Sessions
Information Technology
Home›Information Technology›Penetration testing to identify attacks in enterprise computer systems and networks

Penetration testing to identify attacks in enterprise computer systems and networks

By MDIS
20th November 2019
1989
0

Penetration testing or pen test is defined as the simulation of a real-world attack on a target network or application through a wide range of activities. Penetration testing process is held by the auditor of the network or by a designated pen-tester. In technical terms, a pen-test is a methodical system to probe the present system from inbound and outbound corners, to determine the potential vulnerabilities. The system, in this context may refer to a union of hosts or network and/or applications involved in the industry infrastructure.

Pen-testing is not only concerned about technical and machine flaws, but also physical security loopholes and operating system flaws. By using proper pen-testing tools in various phases, with the help of authorised IT professionals, we can prevent cyber-attacks and up the ante of cyber security.

Let’s explore three main pen-testing phases and the tools involved:

Pre-attack phase

In conclusion, penetration testing is a crucial process to protect enterprise systems and network. It should be carefully implemented by using various tools and techniques to achieve a high level of security. Most enterprises understand the use of penetration testing and hire cyber security professionals to prevent their systems and network from malicious attacks. With continuous efforts in fortifying enterprise systems and networks, attacks can be minimised and proper counter measures can be devised and implemented.

Attack phase

This second step in the process is essential for any penetration testing process. It consists of endangering the target with the use of offensive tools. These tools for target probing include social engineering (a broad range of malicious activities accomplished through human interactions), vulnerability test scans, password crackers, wire shark, nessus, burpsuite, meta sploit and NMap. All these are software tools to perform malicious attacks. Once these tools are activated, the first step is to acquire the required privileges, by exploiting the victim and implanting the software to hijack the system. The main purpose of this phase is to maximise the exploitation of the system’s defenses’ flaws.

Post-attack phase

The main aim of this last step is to remove or erase any files or logs, that may point to the activity of the penetration tester. It happens only after the organisation’s network has been exploited and performs a set of actions, that restores the system to its original state. More specifically, it involves actions such as erasing implanted backdoors, cleaning the registry entries, restoring the network devices configuration and removing any connections that were previously made during the attack phase.

In conclusion, penetration testing is a crucial process to protect enterprise systems and network. It should be carefully implemented by using various tools and techniques to achieve a high level of security. Most enterprises understand the use of penetration testing and hire cyber security professionals to prevent their systems and network from malicious attacks. With continuous efforts in fortifying enterprise systems and networks, attacks can be minimised and proper counter measures can be devised and implemented.

This article is written by Latha Manian from the School of Technology.

Previous Article

Filmmaking Scene in Singapore

Next Article

Are we compromising our free will?

MDIS

MDIS

Founded in 1956, the Management Development Institute of Singapore (MDIS) is one of Singapore’s oldest not-for-profit professional institutes for lifelong learning. MDIS has two main subsidiaries: Management Development Institute of Singapore Pte Ltd which oversees its Singapore academic operations, and MDIS International Pte Ltd which focuses on MDIS’ globalisation strategy. MDIS offers internationally-accredited courses in Business and Management, Engineering, Fashion and Design, Health and Nursing, Health Sciences, Information Technology, Languages and Education, Life Sciences, Media and Communications, Psychology, Tourism and Hospitality Management, and Safety and Environmental Management. These programmes are offered in collaboration with renowned universities in the United Kingdom and the United States of America. MDIS also has set a proven track record of preparing students to excel in the Singapore-Cambridge General Certificate of Education (Ordinary and Advanced Level), Cambridge International General Certificate of Secondary Education (IGCSE) and Cambridge International Lower Secondary, through its comprehensive preparatory courses.

Related articles More from author

  • SGTech
    Featured BK RowInformation Technology

    SGTECH Launchpad Tour

    9th April 2018
    By MDIS
  • Featured BK RowInformation Technology

    The Impact Of Blockchain On Online Customer Experience

    3rd August 2020
    By Gaurav Belani
  • Featured BK RowInformation Technology

    Digitalisation: Are We Secure?

    8th October 2021
    By MDIS
  • Computing hacking
    Featured Full Width SliderFeatured PostInformation Technology

    The Truth About Hacking In Five Minutes

    4th June 2018
    By MDIS
  • Information Technology

    Leveraging on technology, people and processes

    5th August 2019
    By MDIS
  • Information Technology

    Beefing up vehicle security systems using GSM

    30th September 2019
    By MDIS

You may also like

  • Featured BK VideoMedia & Communications

    Corporate Video 2016

  • Health & Nursing

    Nursing and Healthcare Professionals

  • fashion design
    Fashion & DesignFeatured BK Row

    The creative process of fashion design

Categories

  • Business & Management (36)
  • Campus (9)
  • Career Management (39)
  • College (17)
  • Engineering (13)
  • Event (35)
  • Fashion & Design (37)
  • Featured BK Row (64)
  • Featured BK Video (10)
  • Featured Full Width Slider (57)
  • Featured Post (88)
  • Health & Nursing (7)
  • Information Technology (33)
  • Languages (16)
  • Life Sciences (25)
  • Lifestyle (11)
  • MDC (14)
  • Media & Communications (29)
  • Pre-degree / Preparatory Courses (1)
  • Psychology (10)
  • Safety Management (9)
  • Student Life (22)
  • Think by MDIS (1)
  • Tourism & Hospitality (29)
  • Uncategorized (11)

Follow us on Instagram

This error message is only visible to WordPress admins

Error: No connected account.

Please go to the Instagram Feed settings page to connect an account.

TAGS

  • Digitalisation
  • engineering
  • Business Administration
  • MDIS Business Club
  • Fashion Design
  • MDIS College
  • life sciences
  • biomedical sciences
  • cybersecurity
  • Artificial intelligence
  • cookery
  • Career Guides
  • MBA
  • MDIS Students
  • Lifestyle
  • MDIS School of Tourism and Hospitality
  • MDIS Graduation Ceremony
  • MDIS School of Fashion and Design
  • MDIS
  • fashion industry
  • MDIS Business School
  • Travel Guides
  • career planning
  • Career Assistance Unit
  • MDIS Events
  • technology
  • fashion
  • Tourism and Hospitality
  • lecturer's life
  • career management
THINK SUCCESS. THINK MDIS.
Copyright© 2022. MDIS Blog. All Rights Reserved.
     
Where lifelong learning begins