Authors
Matt Bishop
Publication date
2007/12/12
Journal
IEEE Security & Privacy
Volume
5
Issue
6
Pages
84-87
Publisher
IEEE
Description
Students generally learn red teaming, sometimes called penetration testing or ethical hacking, as "breaking into your own system to see how hard it is to do so". Contrary to this simplistic view, a penetration test requires a detailed analysis of the threats and potential attackers in order to be most valuable. Using the results of penetration testing requires proper interpretation. Neither testers nor sponsors should assert that the penetration test has found all possible flaws, or that the failure to find flaws means that the system is secure. All types of testing can show only the presence of flaws and never the absence of them. The best that testers can say is that the specific flaws they looked for and failed to find aren't present: this can give some idea of the overall security of the system's design and implementation.
Total citations
2006200720082009201020112012201320142015201620172018201920202021202220232024112961011131481110810231591610
Scholar articles