- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Lee Allen Kevin Cardwell
- 229字
- 2021-07-09 20:20:35
Methodology defined
What exactly is a methodology? This is a term that we use often in the Information Technology (IT) world, but what exactly does it mean? As you might expect, there are a number of different interpretations of this term that usually is dependent on whom you ask. If we use the search capability of the Internet, we can possibly get a better idea of what the term means. From the Wikipedia website, at https://en.wikipedia.org/wiki/Methodology, we see that the term is defined as a systematic, theoretical analysis of the methods applied to a field of study. This definition is a bit too vague for our purposes, so we will look at another source. The site at http://www.wisegeek.com defines the term as "a set of practices." This term may be used to refer to practices, which are widely used across an industry or scientific discipline, the techniques used in a particular research study, or the techniques used to accomplish a particular project."
This definition is closer to what we are looking for, but as with most definition sources, we will use their information as guidance and define the term in our own words. For the concept of this book, we look at a methodology as a "systematic approach to professional security testing that follows a structured process based on the motives of a potential attacker when targeting an organization."
- RESTful Java Web Services Security
- 數(shù)字身份與元宇宙信任治理
- Kali Linux CTF Blueprints
- 大型互聯(lián)網(wǎng)企業(yè)安全架構(gòu)
- 數(shù)據(jù)安全實踐指南
- Kali Linux Network Scanning Cookbook(Second Edition)
- Falco云原生安全:Falco原理、實踐與擴展
- CTF那些事兒
- 黑客攻擊與防范實戰(zhàn)從入門到精通
- Web代碼安全漏洞深度剖析
- 計算機系統(tǒng)與網(wǎng)絡(luò)安全研究
- 黑客攻防入門
- Kali Linux無線網(wǎng)絡(luò)滲透測試詳解
- 數(shù)據(jù)恢復(fù)技術(shù)深度揭秘
- Blockchain Development with Hyperledger