원문정보
초록
영어
Ethical hacking is obviously a very controversial area with prosecution under the Computer Misuse Act only a stone's throw away if you overstep the mark and hack into a system or any mobile device without categorical authorization from the relevant person(s). While everyone is concerned about penetration testing methodologies, and/or penetration testing certification, it is also important to consider a policy that should be followed by both the tester and the client to reduce financial and confidential disparities, and to bring conformity to the operations between the both parties, so this research suggests a policy that should be followed by penetration testers and clients of the penetration tests.
목차
1. Introduction
2. Penetration Testing Policy
3. Conclusion
Reference