The Ethical Hack: A Framework for Business Value Penetration Testing
This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. It goes beyond the technical aspects of penetration testing to address the processes and rules of engagement for successful tests. The text examines testing from a strategic perspective to show how testing ramifications affect an entire organization. Security practitioners can use this book to reduce their exposure and deliver better service, while organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gather from testing with their business objectives.
"1128483621"
The Ethical Hack: A Framework for Business Value Penetration Testing
This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. It goes beyond the technical aspects of penetration testing to address the processes and rules of engagement for successful tests. The text examines testing from a strategic perspective to show how testing ramifications affect an entire organization. Security practitioners can use this book to reduce their exposure and deliver better service, while organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gather from testing with their business objectives.
56.49 In Stock
The Ethical Hack: A Framework for Business Value Penetration Testing

The Ethical Hack: A Framework for Business Value Penetration Testing

by James S. Tiller
The Ethical Hack: A Framework for Business Value Penetration Testing

The Ethical Hack: A Framework for Business Value Penetration Testing

by James S. Tiller

eBook

$56.49  $74.95 Save 25% Current price is $56.49, Original price is $74.95. You Save 25%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. It goes beyond the technical aspects of penetration testing to address the processes and rules of engagement for successful tests. The text examines testing from a strategic perspective to show how testing ramifications affect an entire organization. Security practitioners can use this book to reduce their exposure and deliver better service, while organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gather from testing with their business objectives.

Product Details

ISBN-13: 9781135502478
Publisher: CRC Press
Publication date: 09/29/2004
Sold by: Barnes & Noble
Format: eBook
Pages: 352
File size: 6 MB

About the Author

James S Tiller

Table of Contents

INTRODUCTION Perspectives of Value SECURITY AND HACKING Information Security Security Architecture Hacking Impacts THE FRAMEWORK Business Planning and Operations Reconnaissance Enumeration Vulnerability Analysis Exploitation Final Analysis Deliverable Integration INFORMATION SECURITY PROGRAM Scope of Information Security Programs The Process of Information Security Component Parts of Information Security Programs BUSINESS PLANNING AND OPERATIONS Business Objectives Security Policy Previous Test Results Business Challenges The Business of Security Reasoning Overall Expectations How Deep is Deep Enough? Timing is Everything Attack Type Source Point Required Knowledge Inherent Limitations Imposed Limitations Multi-Phased Attacks Teaming and Attack Structure The Security Consultant The Tester Logistics Technical Preparation Managing of the Engagement Scenario RECONNAISSANCE The Hacker Reconnaissance Techniques ENUMERATION Technical Objective Soft Objective Scope of Effort Looking Around or Attack? Preparing for the Next Phase VULNERABILITY ANALYSIS Weighing the Vulnerability Source Points Reporting Dilemma EXPLOITATION Intuitive Testing Evasion War Dialing Threads and Groups Operating Systems Password Crackers Rootkits Applications Network Services and Areas of Concern FINAL ANALYSIS Critical Warning Informational DELIVERABLE Overall Structure Aligning Findings Format INTEGRATION Mitigation Defense Planning Incident Management Security Policy CONCLUSION APPENDIX-SPOOFING AND SEQUENCE ATTACK
From the B&N Reads Blog

Customer Reviews