Skip to content

Latest commit

 

History

History
23 lines (21 loc) · 812 Bytes

File metadata and controls

23 lines (21 loc) · 812 Bytes

Penetration Testing

  • An evaluation of the holistic approach in terms of cyber security
    • active and passive security scanning of vulnerabilities
    • Open-Source Software (OSS) vulnerability scanning
    • Security policies analysis
    • Analysis of history of public vulnerabilities
    • CRVS product provider response/management and communication to users
    • Analysis of the security of data at rest and in motion
    • Analysis of security guidelines/documentation (including resilience and recovery recommendations)
    • Aase of user interface for setting roles and status visibility.
  1. Introduction & Objectives
  2. Scope of Work
  3. Methodology
    1. Planning
    2. Risk Classification
  4. Tools and Scanners
  5. Identified Vulnerabilities / Findings
  6. Miscellaneous Issues / Non-Findings
  7. Conclusion