Review of the article - discuss the pen-testing skills

Assignment Help Software Engineering
Reference no: EM132160275

Assignment - Review of the given article.

In order to discuss the pen-testing skills of an individual, the fact that this is such a very broad spectrum needs to be highlighted. A Pen-Test can be anything from simply observing or better known in the cyber-realm as "Performing Surveillance/Reconnaissance" to consciously attacking a network for the sole purpose of assessing how secure its applications are. As outlined in the "Certified Ethical Hacker All-in-One Exam Guide", there are 5 phases of ethical hacking. They are (Rahalkar, 2016): Reconnaissance Scanning and Enumeration Gaining Access Maintaining Access Covering Tracks Each of these phases, also have their own disciplines confined within them and in some cases they even overlap each other. In essence one factor is not dependent on the other, although it can be. As a matter of fact if done correctly and thoroughly, they should compliment each other. If we consider this from the perspective of the purpose of the pen-tester then we can identify a hierarchy of the skills necessary to accomplish the job.

According to the authors of Penetration Testing Essentials, "In the real world, you can categorize hackers to differentiate their skills and intent." (Oriyano, 2017) Oriyano categorizes these hackers as the following: Script Kiddies White Hat Hackers Gray-Hat Hackers Black-Hat Hackers Cyberterrorists For the purposes of this discussion, White-Hat Hackers will be considered the Pen-Testers and their purpose can be defined as hackers that follow a code of ethics and possess the skills necessary to attack as well as defend against malicious characters. Their ethics is what defines these White-Hat Hackers, that being said, it fits perfectly with Christian values. The end goal for the White-Hat Hackers is to give their assessment to the client that will benefit them in the long run. Once they stay within the lines of their code of ethics and remain true to their cause they will not compromise biblical ethics. The bible state "No one can serve two masters; for either he will hate the one and love the other, or he will be devoted to one and despise the other.

You cannot serve God and wealth."(Matthew 6:24, NASB) I bring this verse simply because it is cut and dry, either the hacker performs their duties within the scope or they don't.

References - Oriyano, S.-P. (2017). Penetration testing essentials. Indianapolis, Indiana: Sybex, a Wiley brand. Rahalkar, S. A. (2016). Certified Ethical Hacker (CEH) Foundation Guide. Berkeley, CA: Apress L. P. cp.

Verified Expert

The main thing which is discussed in the article is related to the concept which are usually used by the hackers to indulge into bypassing the security of the system or network.

Reference no: EM132160275

Questions Cloud

Calculate the real value of bill income : Using the base year as the comparison year, calculate the Real Value of Bill's Income for 2010 measured in base year dollars.
What is one health behavior change you need : What is one health behavior change you need to make and what hurdles are stopping you? How can this individual technique of behavior change be applied.
Discuss strategic analysis decisions in the next five years : Discuss strategic analysis decisions in the next five years, what we need to watch out for in the information technology (IT) field,
Employ attribution theory in diverse : In what ways might managers employ attribution theory in a diverse, multicultural setting?
Review of the article - discuss the pen-testing skills : Review of the given article. In order to discuss the pen-testing skills of an individual, the fact that this is such very broad spectrum needs to be highlighted
Why is accountability important in the health care industry : Why is accountability important in the health care industry? How is an employee's accountability measured in the health care industry?
How do they ensure the tools and techniques : What tools and techniques do healthcare organizations use to empower their staff? How do they ensure the tools and techniques they are using are implemented.
Constant improvement in operational effectiveness : Explain the quote in a real practical, business way. “Constant improvement in operational effectiveness is necessary to achieve superior profitability.
Evaluate pros and cons associated with each mode of entry : Discuss and describe the various modes of entry. Evaluate the pros and cons associated with each mode of entry.

Reviews

Write a Review

Software Engineering Questions & Answers

  Car park system analysis and design

Car Park System Analysis and Design - Analysis Use Case Model Diagram for whole system

  1nbsp what was howard schultzs original strategic vision

1.nbsp what was howard schultzs original strategic vision for starbucks? is his 2010 strategic vision for starbucks

  Identify trends in mobile software development

Identify trends in mobile software development and explain why they are relevant to the scenario described above. Explain how the different mobile platform will affect the different phases of requirements, design, development, and deployment of the m..

  Explain the relationship between observation law and theory

The following diagram is from the text. Clearly and thoroughly explain the relationship between observation, law and theory. Illustrate your answer with examples - with at least one from software engineering.

  Explain the steps or phases in the methodology

Explain the steps or phases in the methodology, and what activities are done in each. Then describe the model you have selected and how it is used.

  How can businesses safely budget for information security

This costs a lot of money, and can be detrimental to business if not placed on the highest priority. How can businesses safely budget for information security

  Explain activities that take place during each phase of sdlc

They have asked you to develop a presentation that explains the activities that take place during each phase of the SDLC to ensure software development success.

  What role does the isp play in cloud computing

What role does the ISP play in cloud computing other than just being the service provider?

  Brainstorming and delphi technique for risk identification

Discuss the difference between using brainstorming and the Delphi Technique for risk identification and determine some of the advantages and disadvantages of each approach?

  Design a floating point calculator and draw a uml class

question 1narrativethe examiner of the course offering must set up the assignment before markers can begin marking

  Embedded system development spring

Embedded System Development Spring, Multiply the Number 0x 00000DBF by Decimal 9 using shift instruction consider the result Minuend. Divide 0x00000CD8 by Decimal 4 by shift instruction and consider the result Subtrahend.

  You are a marketing manager interviewing for a new job at

you are a marketing manager interviewing for a new job at several different firms simultaneously. you expect to be

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd