9 Testing your systems

This chapter covers

  • Differentiating and choosing between the different types of penetration tests
  • Learning how bug bounty programs work and when to use one
  • Learning why a physical penetration test is important
  • Differentiating between red and blue teams to learn how they support our organization’s security

We can’t measure or manage risk unless we know about the vulnerabilities in our own software and systems. To do this, we need accurate, timely, and actionable data on vulnerabilities, which means a lot of testing. In the first part of the book, we learned how attackers will exploit some common physical and virtual vulnerabilities. Now let’s learn about the different ways we can find these vulnerabilities ourselves, before ...

Get Making Sense of Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.