A STUDY ON INTEGRATING PENETRATION TESTING INTO THE INFORMATION SECURITY FRAMEWORK FOR MALAYSIAN HIGHER EDUCATION INSTITUTIONS

被引:0
作者
Kang, C. M. [1 ]
JosephNg, P. S. [2 ]
Issa, K. [2 ]
机构
[1] KDU Univ Coll, Sch Comp & Creat Media, Glenmarie Campus,Jalan Kontraktor U1-14, Shah Alam 40150, Selangor, Malaysia
[2] SEGi Univ, Sch Informat Technol, Petaling Jaya 47810, Selangor, Malaysia
来源
2015 INTERNATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES AND COMPUTING RESEARCH (ISMSC) | 2015年
关键词
Information security; Pen-test; hacking; security framework; security development life cycle;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of information technology, hackers are provided powerful tools and therefore ensuring the security of the information is becoming a complex task. Using hacking tools and techniques also known as penetration testing or ethical hacking can contribute to mitigate the security risks. However, due to the misinformation on penetration testing, some managers refused to adopt this arm to protect their information against hackers. As a result, in Malaysian Higher Education Institutions domain, the number of victims of hackers keeps increasing considerably. The research objectives are to enable a paradigm shift on higher management level on penetration testing as part of the essential IT security components. To demonstrate how penetration testing contributes to improve the security. To provide security managers and top managers a positive vision of pen-testing through a revised security framework based on an existing one. This research will be carried out qualitatively and quantitatively, and its output will be based on numeric analysis, case study, survey and literature reviews.
引用
收藏
页码:156 / 161
页数:6
相关论文
共 20 条
[1]  
Ajinkya, 2013, PENETRATION TESTING
[2]  
Al-Saedi Karim, 2013, Journal of Computer Science, V9, P421, DOI 10.3844/jcssp.2013.421.426
[3]  
[Anonymous], 2012, PRINCIPLES INFORM SE
[4]  
[Anonymous], 2001, IND SUST DEV GUID ME
[5]  
Barcudio Aileen G., 2011, INT J NETWORK SECURI, V3, P1
[6]  
Barcudio Aileen G., 2009, INT J ADV SCI TECHNO, V8, P1
[7]  
Bhaya Wesam S., 2012, Journal of Computer Science, V8, P1769
[8]   The economic impact of cyber terrorism [J].
Hua, Jian ;
Bapna, Sanjay .
JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2013, 22 (02) :175-186
[9]  
Ismail Zuraini, 2010, J INFORM ASSURANCE, V2010, P1
[10]  
JosephNg P.S., 2013, INT J BUSINESS INFOR, V13, P217