External– performed from an outsider’s perspective, usually across the internet, identifies publicly accessible vulnerabilities and determines what information is available to hackers.
Internal – performed from inside the network to determine how much information a disgruntled employee or contractor can acquire without detection.
Wireless – assesses the security of an authorized wireless network while identifying rogue access points, maps an area’s wireless activity, and shows signal leakage.
Dial-Up – identifies unauthorized modems that could allow remote access and tests known modems for security weaknesses.
Application – in-depth probing to fully test access controls and to identify configuration deficiencies and security vulnerabilities.
Regulatory Compliance – assesses the gaps between the existing security posture and regulatory requirements and verifies compliance through repeated testing.