In order to defend digital resources, security professionals must understand the methodology the cyber attacker will take to compromise an organization’s resources. The penetration testers methodology was developed to follow the phases of compromise that an attacker may take to exploit your information systems.
Research how the phases of compromise that an attacker will take align with the PEN testers methodology. Use at least three academic sources; each should come from current journals or articles (within the past 5 years), beyond the assigned readings.
Then, read the article “Apple, FBI, and Cybersecurity: The Basics,” located in the topic Resources.
Address the following in a 500- to 750-word essay:
-Explain how the phases of compromise that an attacker will take align with the PEN testers methodology.
-Identify the goals and objectives of each phase when evaluating.
-Take a stand, either pro or con: should all phases of the PEN Testers be included in the scope when conducting phase testing? Include supporting evidence for each phase.
-Describe what would motivate an organization to perform penetration testing cyber operations.
-Determine where the use of flaw hypothesis methodology would intersect with the PEN testers methodology. How could other methodologies such as OSSTMM affect the PEN testers methodology steps?
-Consider Matthew 10:6, “as wise as serpents yet as harmless as doves.” How would you make a decision or align legal and ethical issues of cybersecurity with the Christian worldview? Who gets to benefit when following the aforementioned verse?
***SOURCES MUST BE ACADEMIC***
FBI ARTICLE
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount