Penetration testing process: a preliminary study.
Penetration testing also known as pen testing, ethical hacking or white hat hacking. Ethical hacking is a similar activity that attempts to discover and fix vulnerabilities in a system. The objective of this paper is to identify several methods and vulnerability assessment processes used in penetra...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UTM Press
2022
|
Subjects: | |
Online Access: | http://eprints.utm.my/104575/1/TanWaiHuaSaifulAdliIsmailHafizaAbas2022_PenetrationTestingProcessAPleliminaryStudy.pdf http://eprints.utm.my/104575/ https://oiji.utm.my/index.php/oiji/article/view/190/144 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Penetration testing also known as pen testing, ethical hacking or white hat hacking. Ethical hacking is a similar activity that attempts to discover and fix vulnerabilities in a system. The objective of this paper is to identify several methods and vulnerability assessment processes used in penetration testing. Besides, the article has elaborated the benefit and challenges in adapting penetration testing in an organization. A literature review from analysis of academic published papers, articles, and other commercial articles are conducted through the research approach of this paper writing. The review focuses on various journals discussed on different of penetration testing methods and the fundamental differences between penetration testing methods and vulnerability assessment methods commonly practised by organizations. |
---|