Penetration testing

0Citations
Citations of this article
172Readers
Mendeley users who have this article in their library.

Abstract

This chapter provides a general introduction to the subject of penetration testing and provides the security professional with the background needed to understand this special area of security analysis. Penetration testing can be a valuable tool for understanding and improving the security of a computer or network. However, it can also be used to exploit system weaknesses and attack systems and steal valuable information. By understanding the need for penetration testing, and the issues and processes surrounding its use, a security professional will be better able to use penetration testing as a standard part of the analysis toolkit.

Cite

CITATION STYLE

APA

Fried, S. D. (2007). Penetration testing. In Information Security Management Handbook, Sixth Edition (pp. 1005–1017). CRC Press. https://doi.org/10.32014/2018.2518-1467.25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free