Review of the article - discuss the pen-testing skills

Assignment Help Software Engineering
Reference no: EM132160275

Assignment - Review of the given article.

In order to discuss the pen-testing skills of an individual, the fact that this is such a very broad spectrum needs to be highlighted. A Pen-Test can be anything from simply observing or better known in the cyber-realm as "Performing Surveillance/Reconnaissance" to consciously attacking a network for the sole purpose of assessing how secure its applications are. As outlined in the "Certified Ethical Hacker All-in-One Exam Guide", there are 5 phases of ethical hacking. They are (Rahalkar, 2016): Reconnaissance Scanning and Enumeration Gaining Access Maintaining Access Covering Tracks Each of these phases, also have their own disciplines confined within them and in some cases they even overlap each other. In essence one factor is not dependent on the other, although it can be. As a matter of fact if done correctly and thoroughly, they should compliment each other. If we consider this from the perspective of the purpose of the pen-tester then we can identify a hierarchy of the skills necessary to accomplish the job.

According to the authors of Penetration Testing Essentials, "In the real world, you can categorize hackers to differentiate their skills and intent." (Oriyano, 2017) Oriyano categorizes these hackers as the following: Script Kiddies White Hat Hackers Gray-Hat Hackers Black-Hat Hackers Cyberterrorists For the purposes of this discussion, White-Hat Hackers will be considered the Pen-Testers and their purpose can be defined as hackers that follow a code of ethics and possess the skills necessary to attack as well as defend against malicious characters. Their ethics is what defines these White-Hat Hackers, that being said, it fits perfectly with Christian values. The end goal for the White-Hat Hackers is to give their assessment to the client that will benefit them in the long run. Once they stay within the lines of their code of ethics and remain true to their cause they will not compromise biblical ethics. The bible state "No one can serve two masters; for either he will hate the one and love the other, or he will be devoted to one and despise the other.

You cannot serve God and wealth."(Matthew 6:24, NASB) I bring this verse simply because it is cut and dry, either the hacker performs their duties within the scope or they don't.

References - Oriyano, S.-P. (2017). Penetration testing essentials. Indianapolis, Indiana: Sybex, a Wiley brand. Rahalkar, S. A. (2016). Certified Ethical Hacker (CEH) Foundation Guide. Berkeley, CA: Apress L. P. cp.

Verified Expert

The main thing which is discussed in the article is related to the concept which are usually used by the hackers to indulge into bypassing the security of the system or network.

Reference no: EM132160275

Questions Cloud

Calculate the real value of bill income : Using the base year as the comparison year, calculate the Real Value of Bill's Income for 2010 measured in base year dollars.
What is one health behavior change you need : What is one health behavior change you need to make and what hurdles are stopping you? How can this individual technique of behavior change be applied.
Discuss strategic analysis decisions in the next five years : Discuss strategic analysis decisions in the next five years, what we need to watch out for in the information technology (IT) field,
Employ attribution theory in diverse : In what ways might managers employ attribution theory in a diverse, multicultural setting?
Review of the article - discuss the pen-testing skills : Review of the given article. In order to discuss the pen-testing skills of an individual, the fact that this is such very broad spectrum needs to be highlighted
Why is accountability important in the health care industry : Why is accountability important in the health care industry? How is an employee's accountability measured in the health care industry?
How do they ensure the tools and techniques : What tools and techniques do healthcare organizations use to empower their staff? How do they ensure the tools and techniques they are using are implemented.
Constant improvement in operational effectiveness : Explain the quote in a real practical, business way. “Constant improvement in operational effectiveness is necessary to achieve superior profitability.
Evaluate pros and cons associated with each mode of entry : Discuss and describe the various modes of entry. Evaluate the pros and cons associated with each mode of entry.

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd