Chapter 18. Managing Security Changes

In This Chapter

  • Automating tasks

  • Watching for misbehavior

  • Outsourcing testing

  • Keeping security on everyone's mind

Information security is an ongoing process that you must manage effectively to be successful. This goes beyond periodically applying patches and hardening systems. Performing your ethical hacking tests repeatedly is critical; information security threats and vulnerabilities emerge constantly. Additionally, ethical hacking tests are just a snapshot of your overall information security, so you have to perform your tests continually to keep up with the latest security issues. Ongoing vigilance is not only required for compliance with various laws and regulations but also for minimizing business risks related to your information systems.

Automating the Ethical Hacking Process

You can run a large portion of the ethical hacking tests in this book automatically if you have the right tools:

  • Ping sweeps and port scans to show what systems are available and what's running

  • Password-cracking tests to attempt access to external Web applications, remote access servers, and so on

  • Vulnerability scans to check for missing patches, misconfigurations, and exploitable holes

  • Exploitation of vulnerabilities (to an extent, at least)

Note

You must have the right tools to automate tests:

  • Some commercial tools can set up ongoing assessments and create nice reports for you without any hands-on intervention — just a little setup and scheduling time up front. This is why ...

Get Hacking For Dummies® 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.