Image

Network Scanning verifies the structure of the target system and likely attack points.

  • Port scanning to verify unnecessarily open ports.
  1. Vulnerability scanning to verify known vulnerabilities.
  • Identification of systems and services unnecessarily visible to the public network.
  • Are there any irrelevant links?
  • Does the internal network reveal information essential for an attack to the public network?
  • Are the servers adequately protected?

As a result of testing and any corrective actions, the system or service at the tested IP address reveals nothing unnecessary to the public network. In addition to testing, the client can verify the flawless operation of alarms and log entries.

All test results are recorded in a document, which also notes any areas for improvement.