Assessing Internet Security Risk, Part 5: Custom Web Applications Continued

by Charl van der Walt
Sept. 24, 2017 0 comments Symantec Pen Testing & Audits internetsecurity

his article is the fifth and final in a series that is designed to help readers to assess the risk that their Internet-connected systems are exposed to. In the first installment, we established the reasons for doing a technical risk assessment. In the second article, we started to discuss the methodology that we follow in performing this kind of assessment. The third part discussed methodology in more detail, focussing on visibility and vulnerability scanning. The fourth installment discussed a relatively unexplored aspect of Internet security, custom Web applications. This article will conclude the discussion of security risks of Web applications.