Assessment of the physical security of the client’s network
Network mapping
Port Scanning
Identification of unknown (to client) servers, applications or appliances on the client
network (such as rogue wireless access points, rogue modems, ICQ servers, Peer to
Peer clients, Instant Messaging clients, web servers and other services installed by
default)
Database vulnerability testing
Server operating system testing
Evaluation of router and switch environment
VPN assessment and testing
Wireless assessment and testing
Assessment of desktop security environment
Network mapping
Port Scanning
Identification of unknown (to client) servers, applications or appliances on the client
network (such as rogue wireless access points, rogue modems, ICQ servers, Peer to
Peer clients, Instant Messaging clients, web servers and other services installed by
default)
Database vulnerability testing
Server operating system testing
Evaluation of router and switch environment
VPN assessment and testing
Wireless assessment and testing
Assessment of desktop security environment
No comments:
Post a Comment