Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Write review on this article with 2 references in APA format. (jonathan) Penetration testing is a sensitive area for most organizations.

Depending on the size of an organization, this can be something that occurs on a regular basis using automated methods such as a vulnerability scanner, or it can be something that occurs in regular increments such as on an annual basis.

In many organizations, this process is a hybrid of the two. However it is done, statistics show that companies need to regularly be performing such tests, to ensure their security.

According a whitepaper put out by Whitehat Security, 55% of retail websites, 50% of healthcare websites, and 35% of financial websites remain in a state of constant vulnerability throughout the year (Whitehat Security, 2015).

This is not only alarming from a statistical standpoint, but also stands in stark contrast to the biblical principle of wise stewardship. While penetration tests are certainly a necessity for every organization, the decision to perform these types of services in an unsanctioned manner brings many moral and ethical questions along with it.

Beyond that, an unsanctioned penetration test can potentially cause outages to production systems, inadvertently expose sensitive data, and possibly bring about more harm than good, regardless of the individual's motivations and intentions. Additionally, the tester could face potential legal repercussions should they be discovered, and/or cause damage to the institution being tested.

According to the Computer Fraud and Abuse Act of 1986, it is a Federal crime to even exceed authorized access on any computer system (CFAA, 1986). While this Federal statute is terribly dated and increasingly irrelevant to the modern technological landscape, the fact remains that a user could potentially face criminal charges under CFAA. As such, one should exercise extreme caution and discernment when performing any kind of penetration test.

My personal stance on the issue is that a responsible party, such as a CISO, Director or Vice President within an organization, should give verbal authorization at the very least, before a penetration test is to be performed. Many would no doubt take this one step further and request written approval prior to performing a penetration test.

While all of us have differing opinions, the Bible reminds us in Hebrews 13:17 that we are to obey those in authority over us (Hebrews 13:17, NASB).

Doing so may go against our grain and take extra time, but it is always a safe bet to get approval. References Whitehat Security. (2015). Website security statistics report.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92434475
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

How can deferred cancellation ensure that thread

How can deferred cancellation ensure that thread termination occurs in an orderly manner as compared to asynchronous cancellation?

Use the management studio to create a new database called

Use the Management Studio to create a new database called Membership2 using the default settings. (If the database already exists, use the Management Studio to delete it and than recreate it)

System analysis and design1 describe a scenario in which

System Analysis and Design: 1) Describe a scenario in which the distribution of users determine the output technology. 2) What is the difference between gradual conversion and modular conversion? 3) At University, the co ...

Flyers inc just paid an eps of 49 this year flyers is

Flyers, Inc., just paid an EPS of $4.9 this year. Flyers is expected to maintain a retained earnings ratio of 50% and ROE of 5.5% for the next five years. After the fifth year, ROE is expected to decrease to 3.3%. Applyi ...

Question what are the subnets that can be supported with

Question : What are the subnets that can be supported with this prefix 204.15.5.0/27. How many hosts can be supported by each of these subnets? Please typewrite your answers, no handwritten answers please.

Suppose that you have 5000 and you are contemplating the

Suppose that you have $5000 and you are contemplating the purchase of two investments, IBM and Walgreen's. One year from now, IBM can be sold at $ X per dollar invested, and Walgreen's can be sold for $ Y per dollar inve ...

Students will create an application that allows the user to

Students will create an application that allows the user to create entities with a dialog window that will be displayed by a ListView in a separate dialog. The main dialog will keep track of how many windows and entities ...

What is the difference between hardware and softwarewhat is

What is the difference between hardware and software? What is the difference between software and data? How is application software different from an operating system?

A humane society claims that less thannbsp32 of us

A humane society claims that less than 32% of U.S. households own a dog. In a random sample of 410 U.S.? households, 153 say they own a dog. At alpha(α) = 0.03, is there enough evidence to support the? society's claim? C ...

A very skilled court stenographer makes two typographical

A very skilled court stenographer makes two typographical errors (typo) per hour, on average. 1. What probability distribution is most appropriate for calculating the probability of a given number of typos being made by ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As