technical_tests_without_involving_employees
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
technical_tests_without_involving_employees [2019/01/23 15:09] – lucy | technical_tests_without_involving_employees [2020/01/13 14:47] (current) – changed "pssoing" to "spoofing" lucy | ||
---|---|---|---|
Line 20: | Line 20: | ||
- | ===== Mail- and Webfilter Test ===== | + | ===== Mail and Webfilter Test ===== |
The Email and Internet malware protection test checks whether the implemented security measures are sufficient to defend against an unstructured or structured malware attack via the e-mail infrastructure or internet infrastructure. With our software you can check which file types could potentially enter the company and which are blocked by the security infrastructure. LUCY works with a wide range of file types that can be brought to the end system via e-mail or on a website for download. You can thus see whether potential malicious code, such as Java files, backdoors, scripts, embedded Office Objects are detected and blocked by the filter infrastructure. | The Email and Internet malware protection test checks whether the implemented security measures are sufficient to defend against an unstructured or structured malware attack via the e-mail infrastructure or internet infrastructure. With our software you can check which file types could potentially enter the company and which are blocked by the security infrastructure. LUCY works with a wide range of file types that can be brought to the end system via e-mail or on a website for download. You can thus see whether potential malicious code, such as Java files, backdoors, scripts, embedded Office Objects are detected and blocked by the filter infrastructure. | ||
Line 60: | Line 60: | ||
- Step 1: Enter the domain you are trying to spoof | - Step 1: Enter the domain you are trying to spoof | ||
- Step 2: Enter a mail recipient, where the spoofed email should get sent to | - Step 2: Enter a mail recipient, where the spoofed email should get sent to | ||
- | - Step 3: After a short time you will see if the pssoing | + | - Step 3: After a short time you will see if the spoofing |
{{ spoofing-test3.png? | {{ spoofing-test3.png? |
technical_tests_without_involving_employees.1548252545.txt.gz · Last modified: 2019/07/25 12:51 (external edit)