ALL >> Technology,-Gadget-and-Science >> View Article
Strategies For Physical Penetration Testing Outlined In New Isaca Resource
![Profile Picture](https://www.123articleonline.com/images/avatar-default.jpg)
Physical penetration testing is often overlooked when it comes to security, despite a 28 percent increase in physical security incidents in both 2021 and 2022. Security professionals can gain a deeper understanding in a new ISACA resource, Physical Penetration Testing: The Most Overlooked Aspect of Security, which shares an overview of physical penetration testing, the significance of physical security, and an exploration of the methodologies and tools employed by physical penetration testers.
Physical penetration testing is designed to identify weaknesses in the physical security controls of an organization and simulate how a real attacker would try to gain access to restricted areas of information. The paper outlines different testing methods, including:
• Social engineering
• Physical/technical bypass
• Destructive vs. nondestructive testing
• Advanced persistent threats
Professionals can also learn about how organizations and testing firms decide on which test they use based on factors such as budget, scope of the engagement, and inside information provided by the organization. ...
... The publication explores these various testing types, including:
• Red team
• Black box
• White box
• Gray box
• Due diligence assessment (walkthrough)
“Technological advancements and variability in where organizational work is performed increases the difficulty securing sensitive data and assets. Enterprises cannot overlook the risks associated with physical access,” says Jon Brandt, Director, Professional Practices and Innovation at ISACA. “Physical security predates information security and while it may remain overshadowed by cyberthreats, the benefits of physical penetration testing are numerous and will strengthen any organization’s overall security posture.”
While there are advantages to physical penetration testing such as regulatory compliance, personnel safety, and data protection, there are also several challenges: cost, time, legal and ethical considerations, armed guard misunderstandings, off-limits areas/assets, and personnel who may not have the right skills for penetration testing. The paper shares strategies for overcoming challenges that an organization may encounter.
To download a complimentary copy of Physical Penetration Testing: The Most Overlooked Aspect of Security, visit www.isaca.org/resources/white-papers/2023/physical-penetration-testing. ISACA members have access to an accompanying CPE quiz.
This resource joins other ISACA content and guidance which can be found here.
###
About ISACA
ISACA® (www.isaca.org) is a global community advancing individuals and organizations in their pursuit of digital trust. For more than 50 years, ISACA has equipped individuals and enterprises with the knowledge, credentials, education, training and community to progress their careers, transform their organizations, and build a more trusted and ethical digital world. ISACA is a global professional association and learning organization that leverages the expertise of its more than 165,000 members who work in digital trust fields such as information security, governance, assurance, risk, privacy and quality. It has a presence in 188 countries, including 225 chapters worldwide. Through its foundation One In Tech, ISACA supports IT education and career pathways for underresourced and underrepresented populations.
Add Comment
Technology, Gadget and Science Articles
1. Best Practices For Security In Software DevelopmentAuthor: Jeryl Airelle
2. From Concept To Reality: How Furniture Configurators Facilitate Custom Furniture Design
Author: HadlyHart
3. Blockchain Development Services- Revinfotech Inc
Author: Revinfotech Inc
4. The Rise Of Ai In Data Collection
Author: Renuka
5. A Thorough Guide On The Application Of Generative Ai In Healthcare
Author: QSS Technosoft
6. How Do I Recover My Gmail Account If I Don’t Remember Anything?
Author: Jos735buttler
7. Why Your Business Needs Cloud-based Inventory Management Software
Author: nagaraj
8. Enhanced Business Communication: Cozy Vision's Wordpress Integration Unveiled
Author: David Smith
9. Tips For Monetizing Your Tiktok Clone Platform
Author: adrianevans
10. How Can A Binance Clone Script Help Your Startup Grow?
Author: joansjonathan
11. How Iot Transforming The Business And Key To Digital Transformation
Author: sdreatech
12. Why Your Business Needs Sales Order Software
Author: nagaraj
13. How To Convert Psd To Wordpress: A Comprehensive Service Guide
Author: Tracey Jones
14. Personalized Banking With Ai Chatbots: A New Era Of Customer Service
Author: QSS Technosoft
15. How To Boost Your Cloud Mastery And Aws With Amazon Q?
Author: QSS Technosoft