Identifying and Assessing Risk Factors to Lower Hazards in Cyber Security Penetration Testing

Identifying and Assessing Risk Factors to Lower Hazards in Cyber Security Penetration Testing

Mayukha Selvaraj, R. Vadivel
DOI: 10.4018/978-1-6684-9317-5.ch013
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

Penetration testing is a rapidly growing field. In today's technological exposure to cyber-attacks, there is a need for easily understandable metrics of cyber-attacks and the impact that it causes on enterprises. The measurement metrics are significant challenges in assessing a cyber-crime incident or a penetration testing audit. There are so many factors in the cyber security field that a penetration tester must consider determining the risk of a particular event or attack. Without any measurement or metrics, there is a chance that the pentesters or penetration testing can get stuck in a bottomless pit without arriving at a defined result. A tool called CVSS attempts to calculate risk based on specific parameters. There are complex technicalities involved in arriving at a risk index to be understood by the board members of an enterprise to make an informed decision about the enterprise's cyber security plan.
Chapter Preview
Top

Cyber Security

Cyberspace is the technology space in the digital world where everything is stored and connected. Securing this cyberspace is called cyber security. Cyber security also means protecting the data via data security (Rossouw and Johan 2013) governed by three main factors: Confidentiality, Integrity and Accessibility (CIA) as illustrated in Figure 1.1

Figure 1.

Cybersecurity foundation

978-1-6684-9317-5.ch013.f01

Cyber security is a field where resources like the Chief Information Security Officer(CISOs) of an enterprise plan the defensive strategy to take care of the risks involved in business transactions of data. An enterprise that conducts business will have to share resources and data between the vendors, suppliers and customers. Once the sharing begins, the exposure starts from there. Once the exposure is initiated there come risks that the enterprise is now open to any kind of cyber-attack.

Complete Chapter List

Search this Book:
Reset