Ethical hacking: the security justification redux.
Bryan SmithWilliam YurcikDavid DossPublished in: ISTAS (2002)
Keyphrases
- security threats
- penetration testing
- security issues
- key management
- security requirements
- security problems
- computer security
- security policies
- information security
- intrusion detection
- security mechanisms
- security analysis
- information systems
- security vulnerabilities
- access control
- statistical databases
- network security
- security level
- security management
- intelligence and security informatics
- data sets
- operating system
- anomaly detection
- network management
- security protocols
- data security
- database systems
- security measures
- smart card