Open Source Security Testing Methodology Research Paper

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Jan 26th, 2024

Features

The Open Source Security Testing Methodology Manual is designed to improve the general excellence of enterprise security, tester strategy, and methodology verification. This document confirms the level of consistency, quality, and repeatability for different security tests (Virvilis & Gritzalis, 2013). The Open Source Security Testing Methodology Manual is in print to give testers and organizations the chance to obtain optimal business value in the activities and routines they are involved in (Herzog, 2014). The components of the Open Source Security Testing Methodology Manual are analysis of internet security, communication security, wireless security and intelligence review in a competitive manner.

We will write a custom essay on your topic a custom Research Paper on Open Source Security Testing Methodology
808 writers online

Benefits

The benefits of the Open Source Security Testing Methodology Manual are comprehensiveness in content, profound value in terms of covering most of the basic security tests, and excellent discussion of the project scope before actual execution. Moreover, the Open Source Security Testing Methodology Manual has different report templates that can be used in writing and testing a project (Herzog, 2014). In addition, the Open Source Security Testing Methodology Manual improves the business value through broadening the testing categories through a step-by-step. This means that the Open Source Security Testing Methodology Manual (OSSTMM) is laden with the benefit of comprehensible security metrics testimonial (Virvilis & Gritzalis, 2013). Besides, the metrics are presented in understandable manner with clear results and verification of factuality (Herzog, 2014).

Penetration Testing Framework 0.59

Features

The Penetration Testing Framework 0.59 is one of the numerous methodologies available for testing network penetration. Specifically, the Penetration Testing Framework 0.59 outlines a step-by-step presentation of different tests for network penetration, especially in terms of the relevant tools for each test. Besides, the Penetration Testing Framework 0.59 outlines clear commands that can be applied in each testing tool (Virvilis & Gritzalis, 2013). The Penetration Testing Framework 0.59 as a network testing tool covers scanning, exploitation, and reconnaissance of the systems that are targeted (Lawson, 2014). Besides, it covers social engineering and specific technology for routers and wireless LAN.

Benefits

The benefits of the Penetration Testing Framework 0.59 are detailed focus on tests that analyze network penetration, provision of alternative and specific tools or commands for testing network penetration, and inclusion of different support tools such as Cisco, wireless LAN, and VoLP among others (Lawson, 2014). This means that there is an added layer of safety in a network since the Penetration Testing Framework 0.59 tests the vulnerability of a network.

Comparative Analysis: Similarities and Dissimilarities

The Open Source Security Testing Methodology Manual (OSSTMM) and Penetration Testing Framework 0.59 use similar approach in security testing. The two methods review consistency and vulnerability of different information technology tools. However, the OSSTMM is more comprehensive and multifaceted than the Penetration Testing Framework 0.59 (Virvilis & Gritzalis, 2013). The comparative analysis is summarized in the table below.

Penetration Testing MethodologyThe existing steps for methodology testingFeatures
OSSTMM6 phasesThis methodology consists of six phases of security tests.

This methodology is applicable in many types of security inspection due to its dynamic and multifaceted nature.
This methodology offers suggestions on security test modeling with different guidelines in performing phases of the security test.

Penetration Testing Framework 0.594 phasesThis methodology consists of four phases of security tests.
The results derived from this methodology vary, depending on the level of penetration test applied and maturity of each test.
This methodology allows for actualization of different scenarios in security assessment, especially with wireless LAN.

References

Herzog, P. (2014). OSSTMM: The Open Source Security Testing Methodology manual. Web.

Lawson, L. (2014). . Web.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Virvilis, N., & Gritzalis, D. (2013). Trusted computing vs. advanced persistent threats: Can a defender win this game? IEEE Autonomic and Trusted Computing, 5(4), 396-403.

Print
Need an custom research paper on Open Source Security Testing Methodology written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2024, January 26). Open Source Security Testing Methodology. https://ivypanda.com/essays/open-source-security-testing-methodology/

Work Cited

"Open Source Security Testing Methodology." IvyPanda, 26 Jan. 2024, ivypanda.com/essays/open-source-security-testing-methodology/.

References

IvyPanda. (2024) 'Open Source Security Testing Methodology'. 26 January.

References

IvyPanda. 2024. "Open Source Security Testing Methodology." January 26, 2024. https://ivypanda.com/essays/open-source-security-testing-methodology/.

1. IvyPanda. "Open Source Security Testing Methodology." January 26, 2024. https://ivypanda.com/essays/open-source-security-testing-methodology/.


Bibliography


IvyPanda. "Open Source Security Testing Methodology." January 26, 2024. https://ivypanda.com/essays/open-source-security-testing-methodology/.

Powered by CiteTotal, referencing generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1