News

The 5 Key Cyber Security Assessment Types

IT Security Assessment types explained

Many companies are completely dependent on the digitization of their business operations. This makes them more efficient, but at the same time it also presents a threat. Malware, spyware, unwary employees and hackers are persistently threatening business continuity.

An unfortunate trend is the increasing volumes of DDoS attacks.  These are becoming increasingly simple and be purchased online for a few euros. However, those few euros are disproportionate to the damage that such an attack can cause for a company. This includes negative media attention, reputational damage and indeed the financial damage that comes from non-productive hours for employees.

IT Security Assessments

Cyber Security Assessments or 'IT Security Assessments' map the risks of different types of cyber threats. This is what makes these assessments a crucial instrument to guarantee operational business continuity. However, there are quite a few types of these security assessments and periodically a new one appears.

How do you know which IT Security Assessment is the best fit for your situation and what threats can these assessments help you to defend against?

In this article we sumarise five different IT security assessment types and explain briefly when to apply them.

1. Vulnerability Assessment

This technical test maps as many vulnerabilities  that can be found within your IT environment as possible. During the Vulnerability Assessment, testers look at the (potential) severity of a possible attack on each part of a system, as well as recovery options and scenarios. The outcome is a priority list of issues that should be addressed.

When to perform a vulnerability assessment?

This test is particularly relevant when not much has been done about security. The aim of the assessment is to fix as many defects as possible, based on a priority list, available budgets and time. Budgeting can also be determined after the Vulnerability Assessment has taken place, so that there is always sufficient budget to solve a detected vulnerability.

2. Penetration Testing

With the Penetration Test a specific potential target is inspected. For example domain rights that could be hacked, but also customer or payment data that could be stolen, or stored information that could be altered by cyber criminals. The outcome of the Penetration Test will show whether the current security posture is sufficient or not.

When to perform the Penetration Test?
This is mainly used to confirm that the configuration of software, version management and locall written written code is safe. For this, several tests have already been performed in advance. This is a test at a higher level and for the best results experienced testers should be used to perform the inspection.

White/Grey/Black-box security test assessments

The White, Grey and Black-box 'assessments' are part of penetration testing . The colours indicate how much information a tester has at their disposal. White stands for a test in which the tester has full access to the code, network diagrams and other relevant information. With a grey-box assessment that level of access and information is not complete, but only partly provided and available. A black-box tester has no prior knowledge about the system that will be targeted.

In case of a black-box assessment, the tester acts like an external hacker that tries to find weaknesses using all sorts of methods and tactics. 

3. Red Team Assessment

A Red Team assessment consists of a group of people who assess the security of company information. The Blue Team is responsible for securing this information. The Red Team is an independent, external group that challenges the Blue Team. The goal of a Red Team Assessment is to improve the effectiveness of the Blue Team.

It is important that the Red Team really is independent, so the Blue Team is put to the test and regularly exposed to the modern and constantly changing (unexpected) attack methods, while monitor the effectiveness of the team and cyber defenses.

When is a Red Team Assessment relevant?
A Red Team Assessment is only useful for companies that apply advanced network security tactics. Moreover, this assessment only makes sense if the Blue Team installed is normally

4. IT Audit

An IT Audit charts whether the current configuration matches the desired compliance standard. This can be based on both technical aspects and documentation. So it does not really test how secure a network is. It only shows how people define security within a company. The result is a document that shoes whether the compliance rules are met.

When to perform an IT Audit?
Audits are primarily instruments that demonstrate compliance. Often companies that are compliant are stricter on safety. However, an audit does provide proof of the level or quality of network security

5. IT Risk Assessment

A Risk Assessment determines the acceptable level and the actual level of risk. This cyber security assessment type analyzes 2 dimensions of risk: the probability and the impact. This can be measured both quantitatively and qualitatively.

After the analysis, the team decides which actions should be initiated to mitigate the actual risk level to an acceptable level as much as possible. The IT Risk Assessment comes with a list of prioritized risks that should be mitigated and recommended actions. 

When is the IT Risk Assessment relevant?
In fact, 'Risk Assessment' is an umbrella term for mapping and identifying potential risks to the assets of a company and how the organization wants to protect those assets. This is why the Risk Assessment useful in many cases.

Reduce Risk with the Cyber ​​Security Assessment

With a cyber security assessment you accurately determine potential exposure to cyber threats. Which fits best with your company depends on the level of security and previous tests performed. Infradata advises you and is then able to perform and arrange IT assessments for you. Together, we bring your company's security policy to a higher level.

Contact us for more information.

9 May 2019

Share this page:

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Find out more here.