Protecting Penetration Test Data

Encryption Schemas

Data Encryption

Data Hashing

Securing Pentest Systems

Encrypt the hard drive

Lock hard drives in a safe

Store systems in a physically controlled room

Perform penetration tests against the pentest systems

Mobile Security Concerns

Wireless Lab Data

two separate labs should be created

a wireless lab designed to practice wireless hacking

a separate lab that can be used to conduct system attacks

results matching ""

    No results matching ""