Achieving Learning Objectives through E-Voting Case Studies
IEEE Security and Privacy
The epistemology of computer security
ACM SIGSOFT Software Engineering Notes
An integrated network scanning tool for attack graph construction
GPC'11 Proceedings of the 6th international conference on Advances in grid and pervasive computing
Hi-index | 0.00 |
Students generally learn red teaming, sometimes called penetration testing or ethical hacking, as "breaking into your own system to see how hard it is to do so." Contrary to this simplistic view, a penetration test requires a detailed analysis of the threats and potential attackers in order to be most valuable. The author looks at penetration testing from the educational viewpoint.