PETA

Tomáš Klíma

PETA

Číslo: 2/2016
Periodikum: Acta Informatica Pragensia
DOI: 10.18267/j.aip.88

Klíčová slova: IT security, Penetration testing, Methodology, IT security audit, informační bezpečnost, penetrační test, medologie, IT bezpečnostní audit

Pro získání musíte mít účet v Citace PRO.

Přečíst po přihlášení

Anotace: Current methodologies of information systems penetration testing focuses mainly on a high level and technical description of the testing process. Unfortunately, there is no methodology focused primarily on the management of these tests. It often results in a situation when the tests are badly planned, managed and the vulnerabilities found are unsystematically remediated. The goal of this article is to present new methodology called PETA which is focused mainly on the management of penetration tests. Development of this methodology was based on the comparative analysis of current methodologies. New methodology incorporates current best practices of IT governance and project management represented by COBIT and PRINCE2 principles. Presented methodology has been quantitatively evaluated.