Advertisement
Guest User

Untitled

a guest
Jun 26th, 2019
87
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.33 KB | None | 0 0
  1. At Lodgify, we pentest the networks internally, while adhering to the methodologies dictated by OSSTMM. Since the inception of the company, we routinely perform internal network audits with close adherence to the aforementioned standards that the Open Source Security Testing Methodology Manual prescribes. The methodologies used, involve surface level network security analysis, operational security metric determination by analyzing and determining an attack surface, followed by a trust analysis, that helps establish and understand the ten properties that help with the analysis. This is then followed by a human security analysis using social engineering, preceded by both physical security analysis and wireless security analysis. When completed, a COMSEC analysis is conducted to ensure that unauthorized interceptors are unable to capture and decipher sensitive telecommunications data. All of the above are done with strict compliance to the legislation here in Spain. Finally, a STAR or a Security Test Audit Report generated in conjunction with templates is written to serve as an executive summary to be presented to the stakeholders. After a final meeting, all points of attack are analysed, and patches are installed. Based on the point of entry, employees are also given a brief and educated with best practices to prevent legitimate attacks.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement