Redirigiendo al acceso original de articulo en 16 segundos...
ARTÍCULO
TITULO

Penetration Testing Professional Ethics: a conceptual model and taxonomy

Justin Pierce    
Ashley Jones    
Matthew Warren    

Resumen

In an environment where commercial software is continually patched to correct security flaws, penetration testing can provide organisations with a realistic assessment of their security posture. Penetration testing uses the same principles as criminal hackers to penetrate corporate networks and thereby verify the presence of software vulnerabilities. Network administrators can use the results of a penetration test to correct flaws and improve overall security. The use of hacking techniques, however, raises several ethical questions that centre on the integrity of the tester to maintain professional distance and uphold the profession. This paper discusses the ethics of penetration testing and presents our conceptual model and revised taxonomy.

 Artículos similares

       
 
Han-eol Kim, Sang-gui Ha, Hafeezur Rehman and Han-kyu Yoo    
Mechanical methods of tunnel excavation are widely used because of their high excavation output, and the selection of appropriate technology depends on ground composition and project-related features. Compared with tunnel boring machines (TBMs) and roadh... ver más
Revista: Applied Sciences

 
Bin Ma, Xinchao Ding and Xingzhou Chen    
The excavation-unloading damage effects of western high-geostress slopes on rock were explored by testing the pre-peak confining pressure unloading sandstone reloading mechanical properties. The deformation and failure mechanisms were studied from a meso... ver más
Revista: Applied Sciences

 
Ayele Tesema Chala and Richard Ray    
Conventional soil classification methods are expensive and demand extensive field and laboratory work. This research evaluates the efficiency of various machine learning (ML) algorithms in classifying soils based on Robertson?s soil behavioral types. Thi... ver más
Revista: Applied Sciences

 
Khuong Tran, Maxwell Standen, Junae Kim, David Bowman, Toby Richer, Ashlesha Akella and Chin-Teng Lin    
Organised attacks on a computer system to test existing defences, i.e., penetration testing, have been used extensively to evaluate network security. However, penetration testing is a time-consuming process. Additionally, establishing a strategy that res... ver más
Revista: Applied Sciences

 
Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali and Noel Crespi    
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications. This mammoth rise in their usage has ... ver más
Revista: Applied Sciences