A-Z Popular New Security Search »
Information Security
 
Related Guides

6 Types of Penetration Test

 , updated on
A penetration test is a type of information security test that simulates attacks against systems or devices to find vulnerabilities. The following are illustrative examples.

White Box

Testing teams are given design overviews and technical documentation to aid them in their attack.

Black Box

Testing teams are given no inside information about a system.

Double Blind Testing

Testing teams aren't given inside technical information and operational teams aren't told that a penetration test is being conducted. Designed to test detection tools and the readiness of operations teams.

Automation

Tools that automatically execute exploit code for known vulnerabilities. Often used in conjunction with a manual test.

Manual

Manual attacks by IT professionals who have knowledge of hacking typically using vulnerability scanners and other automated tools as a starting point.

Contests & Events

Critical systems may benefit from broad and intensive attacks to rapidly harden their design and implementation. This can be achieved with contests and events that invite a large number of individuals to attack a system.
Overview: Penetration Test
Definition
A type of cybersecurity test that simulates attacks against systems or devices to find vulnerabilities.
Type
Related Concepts
Penetration Test Definition
Hardening

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Testing

A list of common testing terms.

Testing vs Quality Assurance

The difference between testing and quality assurance.

Defect vs Failure

The difference between a defect and a failure.

Bug vs Feature

The difference between a bug and feature.

Document Testing

The definition of document testing with examples.

Defects

An overview of defects with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map