본문바로가기

A penentration tester performs a mock infiltration simulation using the technique of an actual attacker on exploitable vulnerabilities that might occur in relevant services and removes causes of the extracted vulnerabilities by grasping the same.

Service Procedures

1. Asset investigation and service analysis: diagnostic target & range selection

2. Diagnostic target selection: Information collection, list-up, vulnerability analysis and vulnerability checklist creation

3. Diagnosis (Infiltration test): Performance of infiltration test based on the extracted vulnerabilities

4. Result analysis and report: Preparation of result analysis and countermeasure, result report

Benefits

Establishment of security system and Reinforcement of responsiveness
 - Autonomous security enhancement
 - Establishment of security stability for personal information leakage prevention

Observance of Acts and Provisions
 - Observance of provisions of Personal Information Protection Act
 - Observance of Information and Communications Network Act

Prior removal of service infiltration threat factors
 - Intellectualized mock hacking accident preparedness
 - Accident preparedness against personal information leakage by insiders/outsiders

Major Customers