emergency responseEmergency Response
CONTACT

Home | Selecting Suitable Pen Testing Strategies

Selecting Suitable Pen Testing Strategies

July 25, 2022 | By / Par : Mykhailo Kuzubov-Cybersecurity Specialist
Share: linked intwitter

In our previous blog, we mentioned 3 strategies of Penetration Testing  which define main approaches towards target security assessment. Now, let’s dive deeper and see into which of them is more suitable in certain situations. The main factors that we’ll use here are cost of assessment vs assessment coverage.

blackbox 1
grey box
whitebox

As a final word, it should be stated that there are now strict boundaries on which testing strategy to use (except common sense ofcourse). As well as there are no strict borders and limitations between use of those three. In the wild you may often see greybox engagement that has attributes of whitebox, or engagement started out as blackbox migrated to greybox under certain circumstances.  

Mykhailo Kuzubov – Cybersecurity Specialist

behind the shield

Be a Contributor

Become a Guest Blogger with Virtual Guardian!

Do you have an idea for our next blog or want to suggest a hot topic for Behind the Shield? Tell us what you want to know!

rss feed icon

Latest Government News

Can’t focus on the many threats to your business?

Let our 24/7 SOC, powered by IBM Security’s QRadar, safeguard your organization.