2003
DOI: 10.6028/nist.sp.800-42
|View full text |Cite
|
Sign up to set email alerts
|

Guideline on network security testing

Abstract: The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the development of technical, physical, administrative, and m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2007
2007
2016
2016

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 1 publication
0
12
0
1
Order By: Relevance
“…They proposed to analyze computer networks from the perspective of an attacker. Highly disputed in the beginning, penetration testing is now an established procedure in information security [5], [6].…”
Section: Penetration Testing a Definitionmentioning
confidence: 99%
“…They proposed to analyze computer networks from the perspective of an attacker. Highly disputed in the beginning, penetration testing is now an established procedure in information security [5], [6].…”
Section: Penetration Testing a Definitionmentioning
confidence: 99%
“…In general, software flaws are notoriously difficult to discover and are often the root cause of major system disruptions and outages. Therefore, writing bug-free and reliable software remains a critical challenge [181]. Due to the 'softwareisation' of networks in SDN, the problems of software design and implementation flaws become an increasingly critical security threat.…”
Section: Sdn Virtualisation Vulnerabilitiesmentioning
confidence: 99%
“…There is a feedback loop between Attack and Discovery, since exploitation leads to more discovery. Besides, the attack phase itself can also be iterative because one successful exploitation might open opportunities for further exploitations [217]. Hackers toolkits and detailed instructions about exploitations found in specialized forums like www.securityfocus.com play an important role at this stage.…”
Section: Related Workmentioning
confidence: 99%
“…It is usually performed internally, by employees organized on a so called Blue Team [217]. On the other hand, a covert pen test happens when only the upper management responsible for the initiative has full knowledge about the testing.…”
Section: Chapter 2 Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation