{"id":15141,"date":"2024-05-11T07:30:20","date_gmt":"2024-05-11T00:30:20","guid":{"rendered":"https:\/\/fpt-is.com\/en\/?post_type=goc_nhin_so&#038;p=15141"},"modified":"2024-05-16T09:34:04","modified_gmt":"2024-05-16T02:34:04","slug":"penetration-testing-vaccine-for-the-digital-economy","status":"publish","type":"goc_nhin_so","link":"https:\/\/fpt-is.com\/en\/insights\/penetration-testing-vaccine-for-the-digital-economy\/","title":{"rendered":"Penetration Testing \u2013 Vaccine for the digital economy"},"content":{"rendered":"<p><span style=\"font-family: arial, helvetica, sans-serif\"><em>Penetration testing (Pentesting) is an important field in the cyber security industry and plays a crucial role in securing systems and data from increasingly sophisticated cyber attacks.<\/em><\/span><\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif\"><strong>The history of Penetration Testing (Pentesting)<\/strong><\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Few are aware that pentesting was originated from &#8220;phreaking&#8221; activities in the 1960s.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">In the 1960s, the blossoming of telecommunications and computing technology in the United States marked a new era and has forever changed the lives of people ever since. Methods of communication and information exchange between people (telephone, radio, etc.) and computing machines made great progress. All of these technologies were commercialized, making them accessible and usable to anyone.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">This was also the time when exploits began, and is considered the origin of what we now call \u201chacking\u201d. Hacking was started by a small group of telephone network users. After a period of use and observation, they discovered a number of vulnerabilities in the telephone network&#8217;s switching system, which allowed them to perform multiple actions such as: call spoofing, free calling, eavesdropping, information theft, etc. These acts were quickly spread and shared with many others (although they are illegal now, these acts were not prohibited at that time as no relevant laws were enacted yet). From there, people who shared the same passion and extensive knowledge of this exploitation gathered, formed a community and engaged in it enthusiastically. The term \u201cphreaking\u201d was created to define exploitation actions, and those who performed these actions call themselves \u201cphreakers\u201d.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><img decoding=\"async\" class=\"wp-image-14799 size-medium aligncenter\" src=\"https:\/\/cdn.fpt-is.com\/vi\/Picture1-700x546.jpg\" alt=\"\u1ea2nh m\u00f4 t\u1ea3 ho\u1ea1t \u0111\u1ed9ng Phreaking c\u1ee7a m\u1ed9t nh\u00f3m phreaker n\u0103m 1971 b\u1edfi Bob Gudgel d\u0103ng tr\u00ean t\u1ea1p ch\u00ed Wired\" width=\"700\" height=\"546\" \/><\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-family: arial, helvetica, sans-serif\"><em>The photo depicts the Phreaking activity of a group of phreakers in 1971 taken by Bob Gudgel (Wired magazine)<\/em><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">In the early 1970s, as Phreaking activities flourished, some phreaker groups developed specialized devices for automated exploitation and sold them to general users. This caused significant damage to telecommunications networks. The US Government and the US Department of Defense identified this as a criminal act. However, they also acknowledged potential risks related to national security and defense, as well as extensive effects in the near future. The US government and companies thus joined hands to establish and sponsor groups called &#8220;Tiger teams&#8221;. The mission of these groups was to research network\/computer systems to find and figure out ways to exploit vulnerabilities or risks, before they were discovered by any phreaker groups or anyone else. The term \u201cPenetration Testing\u201d was consequently created, and is nowadays referred to as \u201cpen-testing\u201d or \u201cpentest\u201d.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Talking about pentesting without mentioning James P. Anderson would be a mistake. He is a computer scientist and security expert, who developed a comprehensive and refined process that enabled &#8216;tiger teams&#8217; to operate more professionally and increase the effectiveness of pentesting activities. Today, this process is still considered a foundation model. Thanks to those great contributions, \u00b7 James P. Anderson \u00b7is widely known as the father of pentesting.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">From the beginning of phreaking, the field of pentesting in particular, and security in general, has grown to become an integral part of all organizations, from governments to enterprises, as humanity enters a new era of the digital economy.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">The application of pentesting has widely spread across various fields, from the military to commercial businesses. Pentesting techniques and tools are constantly evolving, helping to improve the efficiency and accuracy of system security assessment.<\/span><\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif\"><strong>The importance and benefits of Pentesting in the era of digital economy<\/strong><\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">In the digital economy era, in which data becomes a valuable asset and cybercrime increases, pentesting becomes more crucial than ever. In particular, for important systems\/products that contain sensitive information, pentesting will usually be conducted continuously from the beginning until the end of the product\u2019s life cycle.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><img decoding=\"async\" class=\"aligncenter wp-image-14801\" src=\"https:\/\/cdn.fpt-is.com\/vi\/External-Network-Pentest-image-700x319.png\" alt=\"M\u00f4 t\u1ea3 quy tr\u00ecnh th\u1ef1c hi\u1ec7n pentest\" width=\"744\" height=\"339\" \/><\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-family: arial, helvetica, sans-serif\"><em>Description of the penetration testing process (Source: Cobalt.io).<\/em><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Nowadays, pentesting plays an essential role in protecting businesses from cyber attacks, including:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Detect and resolve security vulnerabilities: Pentesting helps identify weaknesses in systems, applications and networks, allowing organizations to take timely corrective measures for cyber attack prevention. <\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Improve cyber defenses: Pentesting enables businesses to evaluate the security level of their systems, putting in place effective preventive measures to minimize the risk of attack, getting a clearer view of the overall security picture, the challenges faced, and how to address them.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Enhance customer trust: Through Pentesting and vulnerability patching, businesses can enhance consumer trust in their data protection capabilities and improve their products and services to be more comprehensive and reliable.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Follow regulations: Many data security regulations requires businesses to periodically perform Pentesting to ensure compliance.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Raise security awareness: Pentesting helps raise employees&#8217; awareness of the importance of security and encourages them to implement safe protection measures for the system.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-family: arial, helvetica, sans-serif\"><strong>&#8220;Vaccine dose&#8221; to protect data for organizations in the digital era<\/strong><\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">After 60 years, humanity has taken great leaps, with phreakers using classic telephone systems now part of history, but cybercrime has evolved into dangerous forces, posing a constant threat to any organization or individual. However, as time goes on, the \u201cwhite-hat hackers\u201d teams (referred to as pentesters) have become increasingly skilled and proficient. They continue to quietly search for vulnerabilities and potential risks within systems, alerting companies and organizations to fix any issues before hackers discover and take advantage of them.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><em><img decoding=\"async\" class=\"aligncenter wp-image-15142 \" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/Number-of-cyber-attacks-1715054489.jpg\" alt=\"Number Of Cyber Attacks 1715054489\" width=\"422\" height=\"246\" \/><\/em><\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-family: arial, helvetica, sans-serif\"><em>Statistics of cyber attacks in Vietnam (Source: Ministry of Information and Communications, report dated January 19, 2024)<\/em><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">In 2023, the Vietnamese Ministry of Information and Communications issued warnings and guidelines on how to handle 12,846 cyber attacks, an increase of 5.3% compared to 2022. Government organizations, financial institutions, banking systems, industrial systems, and other crucial systems were the targets that saw the most attacks over the previous year. In that context, Pentest service becomes an urgent and continuous need for organizations and businesses to test and detect security vulnerabilities, perform system penetration testing.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">According to a Mordor Intelligence report, the market size for penetration testing is expected to reach USD 12.76 billion by 2029, rising at a CAGR of 24.59% over the forecast period (2024\u20132029). The growth of Pentest has resulted in the appearance of numerous individuals and organizations offering cybersecurity services, posing a challenge for customers to seek for a reliable and competent cybersecurity service provider. Thanks to becoming an official member of the CREST organization, FPT IS can demonstrate credibility and capability in the field of cybersecurity testing. We are also given plenty of opportunities to connect with over 300 partners and potential customers within the CREST community.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">The annual number of cyberattacks has been rising quickly so far, making any individual or business a potential &#8220;easy prey&#8221; for cybercriminals. Therefore, equipping your system with &#8220;vaccines&#8221; is extremely critical to maintain safety in a dynamic network environment that presents both possibilities and hazards.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">In Vietnam, there are already many individuals who have achieved international standards, or organizations that provide standard pentest services and have been evaluated and certified by international bodies. Therefore, we can be fully confident that Vietnam has the capability to compete fairly with international peers and provide high-quality services and the best values to customers and partners.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">FPT IS is now among the few companies operating in the field of cybersecurity in Vietnam that meets the qualifications to be an official member of CREST after passing the rigorous assessment process of the CREST organization. FPT IS is also currently the only company in Vietnam to hold both the CREST certification for Pentest service and PCI.QSA certification for consultant, assessment and validation of one\u2019s compliance to PCI DSS.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><img decoding=\"async\" class=\"aligncenter wp-image-14597 size-medium\" src=\"https:\/\/cdn.fpt-is.com\/vi\/FPT-IS-member-of-CREST-as-accredited-company-providing-penetration-testing-700x394.png\" alt=\"FPT IS \u0111\u00e3 ch\u00ednh th\u1ee9c tr\u1edf th\u00e0nh th\u00e0nh vi\u00ean c\u1ee7a t\u1ed5 ch\u1ee9c CREST cho D\u1ecbch v\u1ee5 ki\u1ec3m th\u1eed x\u00e2m nh\u1eadp (Pentest)\" width=\"700\" height=\"394\" \/><\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-family: arial, helvetica, sans-serif\"><em>FPT IS has officially become a member of the CREST organization for Penetration Testing Services (Pentest)<\/em><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Learn more about FPT IS&#8217;s capabilities and services in the Information Security and Cybersecurity industry at: <a href=\"https:\/\/l.facebook.com\/l.php?u=https%3A%2F%2Ffpt-is.com%2Fbao-mat%2F%3Ffbclid%3DIwAR2KWSxGK7GtD-Xhxpt_3P4swzBQwKhSMDPrkvVffzS8mH3TaAh3_5KLs68&amp;h=AT3oOqgJynLOvKJBO79jmUwiOTEjoiSyRKMf6t6OIEzQuOt301o3XVdKXSmYfvLQex1x1_ajkMnCfuj8E1p9SRRWEAXmzajygOgWL-rdulwYfo-LVFTnPFWJ4Ik2rx0TR12IuldR7w&amp;__tn__=R%5d-R&amp;c%5b0%5d=AT2IMK905oBqElkv_4RSHsmhJW3bDduhn96wyxyGBOwbJS6s-QqhhGn6L3uMGQC8uQe1cVqa8Qz4q6ux5GpJVQq-g7jWz5m_Q3tBAyyqSmln-43Hb17XRveP6VM1NUGSTqx6cGtBfhtxm2piabTi6wfCrW0zSp7L2kKtgs8lO7L3UzGktZBx20bUS0Lxglg2s-_VO6gWHO3CmQ1WXUg\">https:\/\/fpt-is.com\/bao-mat\/<\/a><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">&#8212;&#8212;&#8211;<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Exclusive article by FPT IS Technology Expert<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Pham Viet Hoa<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Information Technology Security Engineer<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Cyber Security Center &#8211; FPT IS.<\/span><\/p>\n","protected":false},"author":3,"featured_media":15345,"parent":0,"template":"","nang_luc":[],"danh_muc_goc_nhin_so":[],"dich_vu":[],"linh_vuc":[],"platform":[],"san_pham":[],"the_goc_nhin_so":[],"class_list":["post-15141","goc_nhin_so","type-goc_nhin_so","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so\/15141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so"}],"about":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/types\/goc_nhin_so"}],"author":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/users\/3"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media\/15345"}],"wp:attachment":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media?parent=15141"}],"wp:term":[{"taxonomy":"nang_luc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/nang_luc?post=15141"},{"taxonomy":"danh_muc_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/danh_muc_goc_nhin_so?post=15141"},{"taxonomy":"dich_vu","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/dich_vu?post=15141"},{"taxonomy":"linh_vuc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/linh_vuc?post=15141"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/platform?post=15141"},{"taxonomy":"san_pham","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/san_pham?post=15141"},{"taxonomy":"the_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/the_goc_nhin_so?post=15141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}