1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
13

The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal

testing. Compare these two methodologies and write a report to management. When writing your report, make sure you are writing it as though you are writing it as a report to management, not as though you were answering a homework assignment question.
Computers and Technology
1 answer:
Sonbull [250]3 years ago
7 0

Answer:

The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology ,  extended analysis of all stages

Explanation:

Solution

Penetration testing has several methodologies which include :OSSTMM and PTES  

The comparison between OSSTMM and PTES is stated as follows:

OSSTMM:                                                

Security assessment methodology

More Theoretical  

Metrics based

PTES :

Technology oriented

Penetration testing methodology

Extended analysis of all stages

Now,

There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)

  • Pre-engagement Interactions
  • Intelligence Gathering
  • Threat Modeling
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting

Now,

The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.

The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.

Six areas are covered by OSSTMM which are:

  • Information security
  • Process security
  • Internet technology security
  • Communications security
  • Wireless security
  • Physical security
You might be interested in
Which of the following statements about arrays are true?
astraxan [27]

Answer:

<em>A. </em><em>Arrays are a group of variables that all have the same type.</em>

Explanation:

The correct Option is <em>A. Arrays are a group of variables that all have the same type.</em>

In computer science an array refers to all data structure that is capable of storing more than one item of data (value / variable) at a time or collection of elements (values / variables). Mostly the elements involved in the array are all the same data type. Arrays are tipically implemented in computer programs for data organization in such a way that any related set of values can be searched with ease.

7 0
4 years ago
Roman has painstakingly developed the animation for one of the objects on his slide. He can now use the Animation Painter to cop
tigry1 [53]
I think the answer is True
5 0
4 years ago
Using selection sort, how many times longer will sorting a list of 40 elements take compared to a list of 5 elements
Hoochie [10]

It will take 8 times more time to sort a 40-element list compared to the time spent on a 5-element list.

We can arrive at this answer as follows:

  • We can see that if we divide a group of 40 elements into groups containing 5 elements, we will have 8 groups.
  • In this case, the time it would take to sort the list of one group of 5 elements would be repeated 8 times so that we could sort all the groups and their elements.

Another way to do this is to divide the number 40 by 5. We would have the number 8 as a result, which indicates that we would need 8 times more time to sort a list of 40 elements, compared to a list of 5 elements.

You can get more information about lists at this link:

brainly.com/question/4757050

5 0
3 years ago
Name two primary goals of quality assurance and control programs:
bulgar [2K]

Answer:

The two main goals are to reach CMM level 5, and when the company can be termed as optimized.

The second goal is to minimize the bugs at the current level as well. And this is important, as improvement is one thing, and ensuring you are correct at the current time is another, and which is essential for survival. And you can think of improvement only if you survive.

Explanation:

The dream of all companies is to become Optimized. And they always try to reach CMM level 5, such that they can serve their clients in the best possible manner. And it is the quality assurance team that keeps an eye on the working of the company and keeps on giving their feedback so that the team can provide better service to the clients in the future, and probably reach the CMMI level 5.

The control program makes the operating system better through the development of an environment in which one can run various other programs. And it, in general, formulates the graphical interface and leverage you to run various programs at one time in various windows. And the control programs are also being known as the operating environment.

5 0
3 years ago
. A search engine is a way to
Sindrei [870]
<span>Option A, the search engine is the way to get information on the internet through a web browser, installed on an operating system of a computer. It is software that gathers all the information and stores it to accelerate the search for the users by entering the data of the desired information.</span>
8 0
4 years ago
Read 2 more answers
Other questions:
  • In Word you can _____ or merge two different copies of the same document into one document. a. replicate b. duplicate c. copy d.
    11·1 answer
  • To select all the text in a document, press ____.
    12·2 answers
  • Find the number of ideal integers within the given segment [low,high] inclusive. An ideal number is a positive integer that has
    9·1 answer
  • Generally, the more secure the system, the less usable it becomes. <br> O True O False
    9·2 answers
  • How much heat is needed to raise the temperature of 7g of water by 15oC?
    6·1 answer
  • Write a function template that accepts an argument and returns its absolute value. The absolute value of a number is its value w
    11·1 answer
  • Photographs, illustrations, and videos are increasingly created an and viewed in digital formats. True or False​
    5·2 answers
  • The following statements regarding centralized administration concepts are presented to you in an interview in which only one of
    5·1 answer
  • Which measure is best to use to avoid outliers from corrupting the average?
    14·1 answer
  • Daily IT Question
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!