Chapter 14

Follow a Proven Path for Security

If a corporate computer network was well planned and protected, has well-trained staff, and has a solid security posture and policy in place, they might have done their due diligence. However, that does not mean all the systems are guaranteed to be safe. We need to test the network regularly to prove that point. Security testing can be done internally by each branch and also by hiring a third-party ethical hacker who can conduct an in-depth penetration test (PenTest). Before a test can be even carried out, you must remember that the testing tools available may not all be free. Plus, who will be the person authorized to say yes to a PenTest, who stands to watch the tests, who takes the reports, and ...

Get Database and Application Security: A Practitioner's Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.