It seems like an almost daily occurrence that the media is reporting on some type of IT security breach in recent years. These events are becoming more common because, in short, security is cracked more frequently as technology grows more complex. Aside from the reported instances of breaches, there are countless unreported security breaches on a daily basis, many of which are rather insignificant, but some of which are substantial and worthy of concern.
Security assessments often focus on system management, but it’s not uncommon for experienced professionals to expand outward in order to identify possible problems. In order to better understand what an assessment team looks for, below we’ll look at a few of the more common ways systems become compromised.