Penetration Taxonomy: A Systematic Review on the Penetration Process, Framework, Standards, Tools, and Scoring Methods
-
Published:2023-07-03
Issue:13
Volume:15
Page:10471
-
ISSN:2071-1050
-
Container-title:Sustainability
-
language:en
-
Short-container-title:Sustainability
Author:
Sarker Kamal Uddin1,
Yunus Farizah1,
Deraman Aziz1
Affiliation:
1. Informatics, FTKKI, Universiti Malaysia Terengganu, Kuala Terengganu 21030, Malaysia
Abstract
Cyber attackers are becoming smarter, and at the end of the day, many novel attacks are hosted in the cyber world. Security issues become more complex and critical when the number of services and subscribers increases due to advanced technologies. To ensure a secure environment, cyber professionals suggest reviewing the information security posture of the organization regularly via security experts, which is known as penetration testing. A pen tester executes a penetration test of an organization according to the frameworks and standardization guidelines. Security breaches of the system, loopholes in OS or applications, network vulnerabilities, and breaking data integration scopes are identified, and appropriate remediation is suggested by a pen tester team. The main aim of a penetration process is to fix the vulnerabilities prior to the attack in tangible and intangible resources. Firstly, this review work clarifies the penetration conception and is followed by the taxonomy of penetration domains, frameworks, standards, tools, and scoring methods. It performs a comparison study on the aforementioned items that develops guidelines for selecting an appropriate item set for the penetration process according to the demand of the organization. This paper ends with a constructive observation along with a discussion on recent penetration trends and the scope of future research.
Subject
Management, Monitoring, Policy and Law,Renewable Energy, Sustainability and the Environment,Geography, Planning and Development,Building and Construction
Reference109 articles.
1. Creating and Implementing an Effective and Deterrent National Cyber Security Strategy;Senol;J. Eng.,2020
2. Fog computing security and privacy for the Internet of Thing applications: State-of-the-art;Alzoubi;Secur. Priv.,2021
3. Electronic commerce: Factors involved in its adoption from a bibliometric analysis;Villa;J. Theor. Appl. Electron. Commer. Res.,2018
4. Inhibitors of Electronic Banking Platforms’ Usage Intention in Deposit Money Banks: Perspectives of Elderly Customers in Developing Economy;Chukwu;Schizophr. Bull.,2021
5. Cyber Security Featuresfor National E-Learning Policy;Buja;Turk. J. Comput. Math. Educ.,2021
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献