常用關鍵字
Will we be intruded if we stack and pile up different prevention measures? If we are really attacked by hackers, to what extent can we prevent them? Can the current system resist unknown attack? Is there any vulnerability assessment in policy management and set up on this system?
Penetration Test (PT) is responsible by the G-Expert® team of our company. They plan the test contents with hackers’ thinking and behavior patterns to simulate all sorts of conditions when attacked by hackers (such as administrators’ negligence, blind spot of program developers, and more). With the help of all sorts of hacker software tools and techniques, we test the strength of the testees’ network in actual situations and the current system environment and security conditions. At the same time, we help discover the unknown leaks in the system.
As the penetration test is completed, we will present suggestions on adjudication or enhancement of the system. If it is the negligence of the information security management that give chance for hackers’ successful attack, we will provide suggestions on the revisions and amendments on the information security management policies.