Deakin University
Browse
1/1
3 files

Visual representation of penetration testing actions and skills in a technical tree model

Download all (848 kB)
conference contribution
posted on 2017-01-30, 00:00 authored by Ahmed Abdulnasir Falah, Lei PanLei Pan, Mohamed AbdelrazekMohamed Abdelrazek
With the dire need for more competent cyber security professionals, two parties endeavor to close this gap, industry certificates that focus on hands-on experience, and higher education institutions that favor assessing knowledge memorization. It is challenging for the enthusiasts to acquire a solid and balanced profile of knowledge and hands-on experience in the professional context. We introduce a visual representation of penetration testing skills, actions and knowledge so that it closely relates theory and skills for cyber security topics which can serve as a guide for professional development. To illustrate our methodology, we selected 10 case studies from the hacking challenges of Cyber Security Challenge Australia 2014, conducted the experiments and aligned necessary skills and the actions to these complex scenarios. These detailed analysis and models are visually presented as a tree to encompass the landscape of penetration testing in practice which could be a valuable tool for enthusiasts and learners to plan their learning activities.

History

Event

Australasian Computer Science Week. Multiconference (2017 : Geelong, Vic.)

Pagination

1 - 10

Publisher

Association for Computing Machinery

Location

Geelong, Vic.

Place of publication

New York, N.Y.

Start date

2017-01-31

End date

2017-02-03

ISBN-13

9781450347686

Language

eng

Publication classification

E Conference publication; E1 Full written paper - refereed

Copyright notice

2017, ACM

Editor/Contributor(s)

[Unknown]

Title of proceedings

ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference