Page 45 - Courses
P. 45

IT Essentials — Introduction to IT

            Control Monitoring and Reporting



































            External Vulnerability Assessment and Penetration Test

            Elina: Wendy, would you mind explaining what is the difference between an external vulnerability
            assessment and a penetration test?

            Wendy: Great question, Elina. Vulnerability tests identify the population of weakness, whereas
            penetration tests validate the strength of controls.

            Wendy: External and internal vulnerability scans look to see if any signatures are violated using a
            network scanner. The assessment may also include activities to test employees’ capability of
            spotting phishing emails and assess business processes to ensure they have appropriate
            confidentiality, integrity, and availability controls (CIA Triad). These controls protect confidentiality
            of data and information assets from attack. The controls also protect the integrity of data and
            information assets from unapproved change and validate their completeness and accuracy to better
            assure their availability in a time of need.

            Wendy: Not performing vulnerability scans can impact our cyber insurance policy, as well as create
            regulatory woes.

            Wendy: Having said all of that, we can ask about these vulnerabilities with the question below.








            Copyright © 2020 by The Institute of Internal Auditors, Inc. All rights reserved.
   40   41   42   43   44   45   46   47   48   49   50