For the next few blogs, I will be discussing some common terms one might encounter if they are lucky to be working within any information security capacity. The first term that I will be discussing and most are probably already familiar with is penetration testing, or often called pen testing.

Pen testing is the practice of attacking an IT system the same way a hacker might attack in order to identify security holes. The person who carries out the testing is often called a penetration tester or pentester.  Of course, this is all done with the permission of the client and also without harming the actual network.  If the client were unaware, this would be considered hacking into the system which is considered illegal.  Most pentesters would recommend that before testing begins, it is in the tester’s best interest to obtain written permission prior in order to cover their ass…

View original post 137 more words


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s