Checking the system from the attacker’s perspective can reveal serious security deficiencies (=shortage)
The attacker thinks like a real hacker
→ Do we use the same methodology as the real hacker or do we need to hide ourselves?
→ We have to use the same technique and hide ourselves, it would be realistic
→ It should be as realistic as possible
The system security cannot be guaranteed without deep and regular penetration testing*
** Penetration testing is a systematic process of evaluating the security of a computer system or network by simulating an attack to identify vulnerabilities and weaknesses. It's a crucial practice in cybersecurity to ensure robust protection against potential threats.*
→ If something is more complex, then the chance of having a vulnerability is much higher
→ if something is more convenient, and again, the chance of having a vulnerability is much higher.
*** Denial of Service (DoS) s a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network.*