works against Internet-based security threats has, fortunately, become considerably more manageable, but a new potentially more complex problem has emerged securing connections from third parties such as busi-
✦ LIBER ✦
Penetration testing and system audit — experience gained during the investigation of systems within the UK
✍ Scribed by Andy Jones
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 891 KB
- Volume
- 16
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
✦ Synopsis
Are based on known vulnerabilities and attack techniques. l Demonstrate clearly and reproducibly the susceptibility of a system to an attack. l Demonstrate the effectiveness of countermeasures. l Can be updated in line with the current threat, and repeated.
There is a growing concern that a large number of system owners perceive that the process of generating a system security policy is an end in itself.That is to say that the 'accreditation' of the system is the end of the process rather than the first step in a process that encompasses the complete lifecycle of the system.
📜 SIMILAR VOLUMES
Penetration testing and system audit — E
✍
Andy Jones
📂
Article
📅
1997
🏛
Elsevier Science
🌐
English
⚖ 215 KB