Writing Homework Help

Estrella Mountain Community College Penetration Testing Methodology Discussion

Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $13/Page
Order Now

In order to defend digital resources, security professionals must understand the methodology the cyber attacker will take to compromise an organization’s resources. The penetration testers methodology was developed to follow the phases of compromise that an attacker may take to exploit your information systems.

  1. Research how the phases of compromise that an attacker will take align with the PEN testers methodology. Use at least three academic sources; each should come from current (within the last 5 years) journals or articles beyond the assigned readings.
  2. Then, read the article “Apple, FBI, and Cybersecurity: The Basics,” located in the required readings.

Address the following in a 500- to 750-word essay:

  1. Explain how the phases of compromise that an attacker will take align with the PEN testers methodology. Take a stand either pro or con; should all Phases of the PEN Testers be included in the scope when conducting phase testing; include supporting evidence.
  2. Describe what would motivate an organization to perform penetration testing cyber operations.
  3. Determine where the use of flaw hypothesis methodology would intersect with the PEN testers methodology. How could other methodologies such as OSSTMM affect the PEN testers methodology steps?
  4. Consider Matthew 10:6, “as wise as serpents yet as harmless as doves.” How would you make a decision or align legal and ethical issues of cybersecurity with the Christian worldview? Who gets to benefit when following the aforementioned verse?

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

.http://erlc.com/resource-library/articles/apple-fb…