The simulated security assessment ecosystem: Does penetration testing need standardisation?

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The simulated security assessment ecosystem: Does penetration testing need standardisation?

Simulated security assessments (a collective term used here for penetration testing, vulnerability assessment, and related nomenclature) may need standardisation, but not in the commonly assumed manner of practical assessment methodologies. Instead, this study highlights market failures within the providing industry at the beginning and ending of engagements, which has left clients receiving am...

متن کامل

Simulated Penetration Testing and Mitigation Analysis

Penetration testing is a well-established practical concept for the identification of potentially exploitable security weaknesses and an important component of a security audit. Providing a holistic security assessment for networks consisting of several hundreds hosts is hardly feasible though without some sort of mechanization. Mitigation, prioritizing countermeasures subject to a given budget...

متن کامل

Vulnerability Assessment and Penetration Testing

In this modern world, all of the persons are using the facility of internet. SECURITY is one of the major issue of the internet. Everyday highly skilled hackers breach the security and take the advantage of vulnerabilities to access the confidential data. To overcome this problem one solution was suggested named Vulnerability Assessment and Penetration Testing (VAPT). Vulnerability Assessment i...

متن کامل

Optimal Information Security Investment with Penetration Testing

Penetration testing, the deliberate search for potential vulnerabilities in a system by using attack techniques, is a relevant tool of information security practitioners. This paper adds penetration testing to the realm of information security investment. Penetration testing is modeled as an information gathering option to reduce uncertainty in a discrete time, finite horizon, player-versus-nat...

متن کامل

Penetration Testing: A Roadmap to Network Security

Network penetration testing identifies the exploits and vulnerabilities those exist within computer network infrastruc‐ ture and help to confirm the security measures. The objective of this paper is to explain methodology and methos behind penetra‐ tion testing and illustrate remedies over it, which will provide substantial value for network security Penetration testing should model r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers & Security

سال: 2016

ISSN: 0167-4048

DOI: 10.1016/j.cose.2016.08.002