preview

Nt1330 Unit 7 Research Paper

Decent Essays

Kaplan University
IT286
Unit 7
Jennifer Polisano

Question 7-1: Write a one page comparison of penetration testing versus the vulnerability scans.
What are the differences and what are the similarities? Outline the steps for a penetration test.
Discuss approaches to a penetration test and vulnerability scan in terms of black box, white box and gray box tests.

Answer 7-1: A vulnerability scan, also known as a vulnerability assessment, scans for known vulnerabilities within a system and reports potential exposures. Whereas a penetration test goes further to exploit weaknesses within a system architecture or computing environment. Another difference is where the vulnerability scan can be automated, the penetration test requires various levels of tester expertise. This goes back to the difference between an IT Professional and a hacker. An IT Professional would be the one to run a vulnerability scan, whereas, a hacker would perform a penetration test.
Penetration testing is usually performed once a year. The test is designed to be short and to the point at identifying what, if anything, has been compromised. …show more content…

WAP came in shortly behind WEP with secure networking communication in mind. It’s a later discovered that WEP doesn’t protect much at all and was then replaced with WPA/WPA2. WPA/WPA2 is the most widely used today. In fact, the only time WEP should be used is when there needs to be communication with old devices that don’t support encryption. WEP, or Wired Equivalent Privacy, is not hard encryption to crack. WAP, or Wireless Application Protocol, uses a smaller revision of HTML called Wireless Markup Language (WML), and is used is wireless devices. WPA/WPA2 is now known as the most secure communication over the internet today. WTLS, Wireless Transport Layer Security, provides authentication, encryption, and data integrity for wireless devices (Dulaney,

Get Access