- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Lee Allen Kevin Cardwell
- 229字
- 2021-07-09 20:20:35
Methodology defined
What exactly is a methodology? This is a term that we use often in the Information Technology (IT) world, but what exactly does it mean? As you might expect, there are a number of different interpretations of this term that usually is dependent on whom you ask. If we use the search capability of the Internet, we can possibly get a better idea of what the term means. From the Wikipedia website, at https://en.wikipedia.org/wiki/Methodology, we see that the term is defined as a systematic, theoretical analysis of the methods applied to a field of study. This definition is a bit too vague for our purposes, so we will look at another source. The site at http://www.wisegeek.com defines the term as "a set of practices." This term may be used to refer to practices, which are widely used across an industry or scientific discipline, the techniques used in a particular research study, or the techniques used to accomplish a particular project."
This definition is closer to what we are looking for, but as with most definition sources, we will use their information as guidance and define the term in our own words. For the concept of this book, we look at a methodology as a "systematic approach to professional security testing that follows a structured process based on the motives of a potential attacker when targeting an organization."
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- 深入淺出隱私計(jì)算:技術(shù)解析與應(yīng)用實(shí)踐
- Kali Linux Wireless Penetration Testing Cookbook
- 可信計(jì)算3.0工程初步(第二版)
- 云原生安全技術(shù)實(shí)踐指南
- 隱私計(jì)算
- 先進(jìn)云安全研究與實(shí)踐
- 編譯與反編譯技術(shù)實(shí)戰(zhàn)
- 華為Anti-DDoS技術(shù)漫談
- 網(wǎng)絡(luò)空間安全:拒絕服務(wù)攻擊檢測(cè)與防御
- 企業(yè)數(shù)據(jù)安全防護(hù)指南
- 復(fù)雜信息系統(tǒng)網(wǎng)絡(luò)安全體系建設(shè)指南
- Mastering Metasploit
- 信息組織
- Instant OSSEC Host-based Intrusion Detection System