Northwestern Polytechnic University Penetration Testing Research Paper

User Generated

afnvqrrc8

Computer Science

Northwestern Polytechnic University

Description

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

Running head: PENETRATION TESTING

1

Penetration Testing Research

Name

Instructor

Course and Title

Date

PENETRATION TESTING

2

Table of Contents

Introduction ..................................................................................................................................... 3

Purpose of Penetration testing ........................................................................................................ 3

Associated Testing Stages............................................................................................................... 4

Testing Methods.............................................................................................................................. 5

Testing and WAF ............................................................................................................................ 6

Conclusion ...................................................................................................................................... 7

PENETRATION TESTING

3
Penetration Testing

Introduction

Penetration testing focuses on testing the computer system for any forms of
vulnerabilities that can leave it a weak target for the attackers. It takes an automated form that
ensures computerized testing (Rahalkar, Rahalkar & Karkal, 2019). Regardless, the cycle
incorporates gathering information about the goal before the test, recognizing possible section
centres, trying to break in either a genuine or a virtual way, and uncovering the issues.

Purpose of Penetration testing

A pen test is mandated for testing any form of a security vulnerability in a system. It's
used to test organization's security technique, its adherence to consistence necessities, its agents'
security care, and the affiliation's ability to recognize and respond to security scenes (Nagpure &
Kurkure, 2017). Commonly, vulnerabilities that are perceived and abused through pen testing are
amassed and g...

Related Tags