Penetration testing and system audit — e
✍
Andy Jones
📂
Article
📅
1997
🏛
Elsevier Science
🌐
English
⚖ 891 KB
Are based on known vulnerabilities and attack techniques. l Demonstrate clearly and reproducibly the susceptibility of a system to an attack. l Demonstrate the effectiveness of countermeasures. l Can be updated in line with the current threat, and repeated. There is a growing concern that a large n