technical_tests_without_involving_employees
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
technical_tests_without_involving_employees [2018/06/08 15:05] – [Spoofing Test] lucy | technical_tests_without_involving_employees [2020/01/13 14:47] (current) – changed "pssoing" to "spoofing" lucy | ||
---|---|---|---|
Line 7: | Line 7: | ||
You have invested time, effort, and money in defenses. However, employees may still execute a malicious file. How do you know your defenses will work? To reduce the risk from malware coming into your environment, | You have invested time, effort, and money in defenses. However, employees may still execute a malicious file. How do you know your defenses will work? To reduce the risk from malware coming into your environment, | ||
- | {{ lhfc22.png?600 }} | + | {{ tech_test_1.png?300 }} |
+ | {{ tech_test_2.png? | ||
Main Questions answered by this tool: | Main Questions answered by this tool: | ||
Line 19: | Line 20: | ||
- | ===== Mail- and Webfilter Test ===== | + | ===== Mail and Webfilter Test ===== |
The Email and Internet malware protection test checks whether the implemented security measures are sufficient to defend against an unstructured or structured malware attack via the e-mail infrastructure or internet infrastructure. With our software you can check which file types could potentially enter the company and which are blocked by the security infrastructure. LUCY works with a wide range of file types that can be brought to the end system via e-mail or on a website for download. You can thus see whether potential malicious code, such as Java files, backdoors, scripts, embedded Office Objects are detected and blocked by the filter infrastructure. | The Email and Internet malware protection test checks whether the implemented security measures are sufficient to defend against an unstructured or structured malware attack via the e-mail infrastructure or internet infrastructure. With our software you can check which file types could potentially enter the company and which are blocked by the security infrastructure. LUCY works with a wide range of file types that can be brought to the end system via e-mail or on a website for download. You can thus see whether potential malicious code, such as Java files, backdoors, scripts, embedded Office Objects are detected and blocked by the filter infrastructure. | ||
Line 53: | Line 54: | ||
The spoofing test will verify, if an anonymous user from the internet can send a spoofed email on behalf of another domain. The test can be found under " | The spoofing test will verify, if an anonymous user from the internet can send a spoofed email on behalf of another domain. The test can be found under " | ||
- | {{ spoofing-test.png?600 }} | + | {{ tech_test_3.png?600 }} |
Procedure: | Procedure: | ||
Line 59: | Line 60: | ||
- Step 1: Enter the domain you are trying to spoof | - Step 1: Enter the domain you are trying to spoof | ||
- Step 2: Enter a mail recipient, where the spoofed email should get sent to | - Step 2: Enter a mail recipient, where the spoofed email should get sent to | ||
- | - Step 3: After a short time you will see if the pssoing | + | - Step 3: After a short time you will see if the spoofing |
{{ spoofing-test3.png? | {{ spoofing-test3.png? |
technical_tests_without_involving_employees.1528463122.txt.gz · Last modified: 2019/07/25 12:51 (external edit)