Methodology of information systems security penetration

Assignment Help Computer Engineering
Reference no: EM131625731

Write review on this article with two references with APA format.

Red Teaming COLLAPSE In today's cyber threat environment it is not possible to add enough controls to eliminate all system vulnerabilities. One solution for this reality is to attempt to utilize the same methods and techniques as black hat hackers by an organization with a team of hackers either on the payroll or contracted from the outside.

This team of authorized hackers is known as a Red Team (Richardson & Thies, 2013).

Penetration Testing software by a red team can be extremely technical and yield credible, high detail, and reliable results. Some downsides of red team testing are they can be expensive, and if not properly controlled, could be destructive to live systems and data (Klíma, 2016). Unfortunately, many of the penetration testing standards tend to focus on the technical testing processes and do little to help systematically address the remediation of any problems that are discovered.

One solution for this problem is for organizations to adopt a standard that integrates penetration tests and their results into the context of information technology management.

One such penetration testing methodology is called PETA and adopts principles from the COBIT and PRINCE2 frameworks. PETA takes a project management approach to penetration testing making it more cost effective, increases the quality of identified vulnerabilities and their countermeasures, produces higher quality documentation, and lessens the impact on systems being tested (Klíma, 2016).

The main advantage of utilizing a red team to penetration test systems, especially if they are an outside firm, is that when they report back their finding it reveals the effectiveness of the security controls, security team, and developers of software and systems (Northcutt, 2006).

Followers of Christ are called on to test themselves and periodically determine if they are following the word of God to the best of their ability, if they pass the test they know Christ is in them and they are on the correct path (C.F. 2 Corinthians 13:15 NIV). If the test is failed then they must find the problem and correct it.

Penetration testing by red teams can be extremely valuable when the process and findings are properly managed. Organizations should make sure tests are properly structured, easily repeatable, and the results consistently followed up on. References Klíma, T. (2016, December).

PETA: Methodology of Information Systems Security Penetration Testing. Acta Informatica Pragensia, 5(2), 98-117. doi:10.18267/j.aip.88 Northcutt, S. (2006).

Penetration Testing: Assessing Your Overall Security Before Attackers Do.

Secure software design. Burlington, MA: Jones & Bartlett Learning.

Verified Expert

The paper is about cyber threats and various vulnerabilities the organization can face and the effectiveness of the red team which is highlighted in the paper. This papers also details from the Bible perspective. This paper has been prepared in Microsoft office document.

Reference no: EM131625731

Questions Cloud

Administer the assessment instrument : Administer the instrument to at least 10 employees (your target subjects) of the company (choose any local company of your choice).
Measure the effectiveness of hr : Describe how HR can use metrics to measure the effectiveness of HR from both a strategic and operational perspective.
Internal control in end-user computing environments : Internal Control Considerations in End-User Computing Environments. Because of the use of personal computers by many businesses.
How would you define a manager : How would you define a manager? How would you define an organization? Please cite your sources. Give an example of a manager and an organization.
Methodology of information systems security penetration : Red Teaming COLLAPSE In today's cyber threat environment it is not possible to add enough controls to eliminate all system vulnerabilities.
How far should companies go in regulating wellness : Do you think companies have the right to dictate what employees do outside of work? How far should companies go in regulating ‘wellness’?
Describe your research and development activities : Describe your research and development activities and explain how they will continue to the company
What were the effects on accounting : What were the effects on accounting, the profession, ethical standards of business conduct in general, employees, supporting businesses?
Applying educational policy and issues : Analyse the mission statement and consider how it reflects a range of issues covered in this course eg Professional development, teachers and the law,

Reviews

inf1625731

10/23/2017 4:43:24 AM

Overall it was a very good assignment an i got good marks in this assessment. The assignment was qualitative with no plagiarisms, which fulfills my assignment requirements. thanks for the service.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd