-
Product
-
Customer Center
-
PR
-
Company
A penentration tester performs a mock infiltration simulation using the technique of an actual attacker on exploitable vulnerabilities that might occur in relevant services and removes causes of the extracted vulnerabilities by grasping the same.
Service Procedures
1. Asset investigation and service analysis: diagnostic target & range selection
2. Diagnostic target selection: Information collection, list-up, vulnerability analysis and vulnerability checklist creation
3. Diagnosis (Infiltration test): Performance of infiltration test based on the extracted vulnerabilities
4. Result analysis and report: Preparation of result analysis and countermeasure, result report
Benefits
Establishment of security system and Reinforcement of responsiveness
- Autonomous security enhancement
- Establishment of security stability for personal information leakage prevention
Observance of Acts and Provisions
- Observance of provisions of Personal Information Protection Act
- Observance of Information and Communications Network Act
Prior removal of service infiltration threat factors
- Intellectualized mock hacking accident preparedness
- Accident preparedness against personal information leakage by insiders/outsiders