Penetration Testing

@inproceedings{Weissman2014PenetrationT,
  title={Penetration Testing},
  author={Clark Weissman},
  booktitle={Encyclopedia of Social Network Analysis and Mining},
  year={2014}
}
  • C. Weissman
  • Published in
    Encyclopedia of Social…
    2014
  • Computer Science
The TCB shall be found resistant to penetration. Near flawless penetration testing is a requirement for high-rated secure systems — those rated above B1 based on the Trusted Computer System Evaluation Criteria (TCSEC) and its Trusted Network and Database Interpretations (TNI and TDI). Unlike security functional testing, which demonstrates correct behavior of the product's advertised security controls, penetration testing is a form of stress testing which exposes weaknesses — that is, flaws — in… 
EVALUATING THE EFFECTIVENESS OF ANTIVIRUS EVASION TOOLS AGAINST WINDOWS PLATFORM
TLDR
Evaluating the effectiveness of some selected antivirus evasion tools revealed that Avet and PeCloak.py AV evasion tools were the best, while Kaspersky and Bitdefender antivirus appeared to be the best performing software protection in detecting the malware evasion tricks.
Verification of soil parameters of hardening soil model with small-strain stiffness for deep excavations in medium dense sand in Ho Chi Minh City, Vietnam
Accurate prediction of wall displacements induced by deep excavations is essential to guarantee stability and safety of the excavation as well as to prevent any harm and damage to the adjacent

References

flaw gives total control of the TCB/system (TC), 2. security policy violation (PV), 3. denial of service (DS), 4. installation dependent (IN), and 5. harmless (H)
  • flaw gives total control of the TCB/system (TC), 2. security policy violation (PV), 3. denial of service (DS), 4. installation dependent (IN), and 5. harmless (H)