Information technology risk management and computer security consulting | Vancouver, Canada, | specializing in network and wireless security
Home
Services

Vulnerability Assessment
Penetration Testing
Security Policy
Remote Access
Intrusion Detection
Wireless Security
Privacy Policy
Privacy Audit
Security Awareness
Security Training
About Us
Consultants
News
Contact Us
Links

Services: Network Penetration Testing & Ethical Hacking

A complete multi-layer review of each access point into the corporate network including Internet gateways, wireless access points, business partners, dial-in modems, and more. Testing simulates real-world attacks and also includes internal reviews to ensure that secondary controls exist in the event of the failure of a perimeter control.

While some of our competitors consider port scanning and vulnerability scanning as a penetration test (as offered in our Internet Vulnerability Assessment), we feel that penetration testing is a much more complicated task.

Penetration testing can be costly with typical engagements for organizations with relatively high network complexity in the $15k-30k range; however, for organizations with a heavy reliance on information systems a return on investment can be easily achieved. Our penetration testing also include one free year of quarterly vulnerability assessments.

Penetration Testing Methodology

At Magnitude CG we believe that penetration testing, also known as ethical hacking, should be completed from all key network interfaces to the outside world. These interfaces include the Internet, connections to business partners, wireless networks, connections to remote offices, and more. In addition, testing should be completed at multiple layers, such as outside the network, inside the network, within the network demilitarized zone (DMZ), and from public or contractor portions of your network.

In addition, we prefer to use an inside-out approach to penetration testing rather than blind testing. With blind testing, we are given very little inside information about the network and perform the test under conditions similar to those faced by a small percentage of attackers. This type of review often misses security holes that would be found by attackers with unlimited time budgets and does not reflect the conditions under which the attackers you should be most worried about would be operating.

It is commonly accepted that the majority of attacks that result in loss to organizations are performed by people with inside knowledge of networks - typically disgruntled insiders or previous employees. By working with inside information Magnitude CG is able to more closely simulate the conditions under which these attacks would operate, as well as allow us to focus our efforts on areas known to be higher risk instead of spending our time chasing dead ends.

Blind penetration testing identifies holes as they appear. Inside-out penetration testing allows us to address the problems that are causing the holes and can prevent new holes form ever appearing on the perimeter.

Risk Assessment

Internet Vulnerability Assessment
Network Penetration Testing
Security Policy, Process, and Procedure Review

Design and Implementation

Secure Remote Access Infrastructure
Intrusion Detection System (IDS)
Secure Wireless Networking

Privacy of Personal Information

Development of Privacy Policy
Privacy Policy Audit

Awareness and Education

Management and Staff Awareness
IT Staff Security Administration Training

[Back to Top]

Home | Services | About Us | Consultants | News | Contact Us | Links