Abstract
Penetration testing is the term given to a process that tests an organizations security by mimicking a specified attack actor. It often comprised of an external test, internal test, web application test, wireless test and a social engineering test. Further segmentation of the main segments also can be conducted. An example is an external test may only concentrate on a specific IP address.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Bibliography
PTES. PTES Technical Guidelines. [Online] Penetration Testing Standard, April 30, 2012. http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines.
MITRE. Common Vulnerabiites and Exposures. [Online] MITRE, February 4, 2015. https://cve.mitre.org.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Lee, N., Manners, D. (2015). Gamification of Penetration Testing. In: Counterterrorism and Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-17244-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-17244-6_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-17243-9
Online ISBN: 978-3-319-17244-6
eBook Packages: Computer ScienceComputer Science (R0)