Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Penetration Testing

Handbook of Research on Interdisciplinary Approaches to Decision Making for Sustainable Supply Chains
It is an authorized simulated cyber-attack on a computer system, performed to evaluate the security of the system.
Published in Chapter:
Security Framework for Supply-Chain Management
Kathick Raj Elangovan (Concordia University, Canada)
DOI: 10.4018/978-1-5225-9570-0.ch025
Abstract
In recent times, cyber-attacks have been a significant problem in any organization. It can damage the brand name if confidential data is compromised. A robust cybersecurity framework should be an essential aspect of any organization. This chapter talks about the security framework for cyber threats in supply chain management and discusses in detail the implementation of a secure environment through various controls. Today, a systematic method is used for handling sensitive information in an organization. It includes processes, people, and IT systems by implementing a risk management method. Distinct controls dedicated to different levels of domains, namely human resources, access control, asset management, cryptography, physical security, operations security, supplier relations, acquisition, incident management, and security governance are provided. Companies, contractors, and any others who are part of the supply chain organization must follow this security framework to defend from any cyber-attacks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Cyber Security Operations Centre Concepts and Implementation
A systematic process of simulating a cyberattack against an organisation to identify vulnerabilities in their networks and applications.
Full Text Chapter Download: US $37.50 Add to Cart
Penetration Testing and Cyber Security Studies in Bangladesh: Post-COVID-19 Managerial Issues
A penetration test, also known as a pen test, is a simulation of an authorized attack that is carried out on a computer system in order to assess the system's level of security. To uncover vulnerabilities in a system and explain how such vulnerabilities may affect a company's operations, professionals known as penetration testers use the same kinds of tools, methods, and procedures that are utilized by attackers.
Full Text Chapter Download: US $37.50 Add to Cart
Social Engineering and its Countermeasures
Use of active hacking techniques to test the effectiveness of information security controls.
Full Text Chapter Download: US $37.50 Add to Cart
Assessing Security with Regard to Cloud Applications in STEM Education
Techniques used to explore and test vulnerability of the underlying network.
Full Text Chapter Download: US $37.50 Add to Cart
Building an Ambidextrous Software Security Initiative
A penetration test, colloquially known as a pen test, or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.
Full Text Chapter Download: US $37.50 Add to Cart
A Cybersecurity Skills Framework
The assessment of an IT system, infrastructure, or application to identify public domain vulnerabilities and assess the risk of these being exploited.
Full Text Chapter Download: US $37.50 Add to Cart
Current Challenges in Intrusion Detection Systems
A part of computer security research, where the objective of an “ethical hacker” is to discover the weaknesses and blind spots of the security software such as intrusion detection systems.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR