Penetration Testing Model

Posted in Internet Security Whitepapers, Penetration Testing

0.0/5 rating (0 votes)

This study on "A Penetration Testing Model" addresses the use of penetration testing in security relevant IT systems. The security of systems that are linked to public networks can be compromised by unauthorized, and usually anonymous, attempts to access them. This situation calls for test methods that are devised from the attacker’s perspective to ensure that test conditions are as realistic as possible. This study is aimed at businesses and institutions which offer, or are planning to offer, penetration tests. It presents a structured approach to penetration testing that facilitates -and can ensure -the efficient and focused performance of such tests. The study is also designed to provide assistance with selection criteria to decision-makers in private and public entities who are planning to commission a penetration test.
∙:∙ If you have trouble viewing this document, please click the link below!
Penetration Testing Model

Comments (0)

Leave a comment

Please login to leave a comment. Optional login below.