VIEWS: 285 PAGES: 17 CATEGORY: Technology Management POSTED ON: 2/12/2010
Our best practice methodologies are step-by-step guides for specific IT projects. We leverage the insight of our expert analysts and on-site consultants to provide best practices and concise solutions that have a direct, measurable impact on your customer's day-to-day operations.
Penetration Testing Audit Tool Company: Company Name Date: MM/DD/YYYY Important Note: The scoring in Sheet 3 - Vulnerability Questionnaire and Sheet 5 - Business Risk Quotient is out of 5. The higher the scores, the less secure the penetration testing. Conversely, low scores represent better security. Worksheet 1 2 3 4 5 6 7 Vulnerability Probability Business Risk Name Business Impact Analysis Weightings Audit Results Final Report Questionnaire Assessment Quotient Used to identify the dollar impact that would occur Determines the weighted Designed to uncover the Determines the likelihood Statement of a Illustrates how a The Final Report with unethical actions/intentions with penetration scoring of categories areas of greatest of a negative security penetration testing penetration testing automatically amasses testing. within Sheet 3 - vulnerability that exist event occurring in any of issue's condition of Current State (in blue) and compiles all metrics - Vulnerability with penetration testing. the 3 categories in relative business risk. ranks against its ideal both Current and Target - Purpose Questionnaire . Sheet 3 - Vulnerability Target State (in red), as well as general Questionnaire . both of which are derived recommendations for from Sheet 5 - Business improvement.
Pages to are hidden for
"Penetration Testing Audit Tools"Please download to view full document