Open Source Security Testing Methodology Research Paper

Exclusively available on Available only on IvyPanda® Made by Human No AI

Features

The Open Source Security Testing Methodology Manual is designed to improve the general excellence of enterprise security, tester strategy, and methodology verification. This document confirms the level of consistency, quality, and repeatability for different security tests (Virvilis & Gritzalis, 2013). The Open Source Security Testing Methodology Manual is in print to give testers and organizations the chance to obtain optimal business value in the activities and routines they are involved in (Herzog, 2014). The components of the Open Source Security Testing Methodology Manual are analysis of internet security, communication security, wireless security and intelligence review in a competitive manner.

Benefits

The benefits of the Open Source Security Testing Methodology Manual are comprehensiveness in content, profound value in terms of covering most of the basic security tests, and excellent discussion of the project scope before actual execution. Moreover, the Open Source Security Testing Methodology Manual has different report templates that can be used in writing and testing a project (Herzog, 2014). In addition, the Open Source Security Testing Methodology Manual improves the business value through broadening the testing categories through a step-by-step. This means that the Open Source Security Testing Methodology Manual (OSSTMM) is laden with the benefit of comprehensible security metrics testimonial (Virvilis & Gritzalis, 2013). Besides, the metrics are presented in understandable manner with clear results and verification of factuality (Herzog, 2014).

Penetration Testing Framework 0.59

Features

The Penetration Testing Framework 0.59 is one of the numerous methodologies available for testing network penetration. Specifically, the Penetration Testing Framework 0.59 outlines a step-by-step presentation of different tests for network penetration, especially in terms of the relevant tools for each test. Besides, the Penetration Testing Framework 0.59 outlines clear commands that can be applied in each testing tool (Virvilis & Gritzalis, 2013). The Penetration Testing Framework 0.59 as a network testing tool covers scanning, exploitation, and reconnaissance of the systems that are targeted (Lawson, 2014). Besides, it covers social engineering and specific technology for routers and wireless LAN.

Benefits

The benefits of the Penetration Testing Framework 0.59 are detailed focus on tests that analyze network penetration, provision of alternative and specific tools or commands for testing network penetration, and inclusion of different support tools such as Cisco, wireless LAN, and VoLP among others (Lawson, 2014). This means that there is an added layer of safety in a network since the Penetration Testing Framework 0.59 tests the vulnerability of a network.

Comparative Analysis: Similarities and Dissimilarities

The Open Source Security Testing Methodology Manual (OSSTMM) and Penetration Testing Framework 0.59 use similar approach in security testing. The two methods review consistency and vulnerability of different information technology tools. However, the OSSTMM is more comprehensive and multifaceted than the Penetration Testing Framework 0.59 (Virvilis & Gritzalis, 2013). The comparative analysis is summarized in the table below.

Penetration Testing MethodologyThe existing steps for methodology testingFeatures
OSSTMM6 phasesThis methodology consists of six phases of security tests.

This methodology is applicable in many types of security inspection due to its dynamic and multifaceted nature.
This methodology offers suggestions on security test modeling with different guidelines in performing phases of the security test.

Penetration Testing Framework 0.594 phasesThis methodology consists of four phases of security tests.
The results derived from this methodology vary, depending on the level of penetration test applied and maturity of each test.
This methodology allows for actualization of different scenarios in security assessment, especially with wireless LAN.

References

Herzog, P. (2014). OSSTMM: The Open Source Security Testing Methodology manual. Web.

Lawson, L. (2014). . Web.

Virvilis, N., & Gritzalis, D. (2013). Trusted computing vs. advanced persistent threats: Can a defender win this game? IEEE Autonomic and Trusted Computing, 5(4), 396-403.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, September 1). Open Source Security Testing Methodology. https://ivypanda.com/essays/open-source-security-testing-methodology/

Work Cited

"Open Source Security Testing Methodology." IvyPanda, 1 Sept. 2020, ivypanda.com/essays/open-source-security-testing-methodology/.

References

IvyPanda. (2020) 'Open Source Security Testing Methodology'. 1 September.

References

IvyPanda. 2020. "Open Source Security Testing Methodology." September 1, 2020. https://ivypanda.com/essays/open-source-security-testing-methodology/.

1. IvyPanda. "Open Source Security Testing Methodology." September 1, 2020. https://ivypanda.com/essays/open-source-security-testing-methodology/.


Bibliography


IvyPanda. "Open Source Security Testing Methodology." September 1, 2020. https://ivypanda.com/essays/open-source-security-testing-methodology/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1