Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please help me answer this cyber secuirty/ computer science question inn great d

ID: 3835243 • Letter: P

Question

Please help me answer this cyber secuirty/ computer science question inn great deatil. thank you

Maintenance is an essential task that is often considered to be dull. In information security, penetration testing may be wrongly perceived as being a “hacker-like” activity. In fact, when done correctly, ethical hacking is an important part of risk management. Penetration analysts work under very restrictive rules of engagement when testing systems. Brainstorm ways that penetration analysts can limit the risk they pose to internal systems.

Explanation / Answer

Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them.
This is done as part of Maintenance Activity within the company to find out the bugs and resolve it much before they are reported by the outside world.

Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application
to find vulnerabilities that an attacker could exploit.

Penetration testing is very closely related to ethical hacking, so these two terms are often used interchangeably.
However there is a thin line of difference between these two terms.
Penetration testing is done by the person who has the knowledge of only the specific area for which he conducts testing.
On the other hand, Ethical Hacker should have comprehensive knowledge of software programming as well as hardware.

Penetration Testing has been a part of information security since the early 1990’s, However it is still a misunderstood practice.
Penetration Testing is considered by many as a "blackart". People get excited at the thought of hiring a firm or individual to perform a penetration test,
so that their job of having the security validation for the company is complete.
This notion tends to distort expectations about the penetration testing, especially the results.

Also, look at popular news sources for stories related to computer vulnerabilities and expect the Penetration testing people to exploit them as well in there
testing. The hard truth is they wont be able to do since they are not Ethical Hackers.

Penetration techniques are used to protect from threats, the potential attackers are also swiftly becoming more and more
sophisticated and inventing new weak points in the current applications. Hence, a particular sort of single penetration testing is not
sufficient to protect your security of the tested systems.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote