1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
13

The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal

testing. Compare these two methodologies and write a report to management. When writing your report, make sure you are writing it as though you are writing it as a report to management, not as though you were answering a homework assignment question.
Computers and Technology
1 answer:
Sonbull [250]3 years ago
7 0

Answer:

The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology ,  extended analysis of all stages

Explanation:

Solution

Penetration testing has several methodologies which include :OSSTMM and PTES  

The comparison between OSSTMM and PTES is stated as follows:

OSSTMM:                                                

Security assessment methodology

More Theoretical  

Metrics based

PTES :

Technology oriented

Penetration testing methodology

Extended analysis of all stages

Now,

There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)

  • Pre-engagement Interactions
  • Intelligence Gathering
  • Threat Modeling
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting

Now,

The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.

The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.

Six areas are covered by OSSTMM which are:

  • Information security
  • Process security
  • Internet technology security
  • Communications security
  • Wireless security
  • Physical security
You might be interested in
Write an expression that will cause "greater or equal to -10" to print if the value of userNum is greater than or equal to -10.
Lilit [14]

Answer:

Expression for the above problem in python language:

userNum=int(input("Enter the value of user_Num")) #it is used to take input.

if(userNum>(-10)): #if statement

   print("The value of the userNum is greator")

elif(userNum==(-10)): #elif statement

   print("The value of the userNum is equal to -10")

else: #else statement.

   print("The value of the userNum is small")

Output:

  • If the user input is (-10), it will print equal.
  • If the user input 10, it will print greator message.

Explanation:

  • The above program or expression is in python language, where the first line is used to render a message to the user take the input and store it into a userNUM variable.
  • Then the second line is used to check the user num value to be greater with the help of if statement.
  • Then the third statement is used to check the user num value to be equal with the help of elif statement.
  • Then the else statement will execute when the if and the elif statement will not true.
6 0
3 years ago
Write a python program to read four numbers (representing the four octets of an IP) and print the next five IP addresses. Be sur
sdas [7]

Answer:

first_octet = int(input("Enter the first octet: "))

second_octet = int(input("Enter the second octet: "))

third_octet = int(input("Enter the third octet: "))

forth_octet = int(input("Enter the forth octet: "))

octet_start = forth_octet + 1

octet_end = forth_octet + 6

if (1 <= first_octet <= 255) and (0 <= second_octet <= 255) and (0 <= third_octet <= 255) and (0 <= forth_octet <= 255):

   for ip in range(octet_start, octet_end):

       forth_octet = forth_octet + 1

       if forth_octet > 255:

           forth_octet = (forth_octet % 255) - 1

           third_octet = third_octet + 1

           if third_octet > 255:

               third_octet = (third_octet % 255) - 1

               second_octet = second_octet + 1

               if second_octet > 255:

                   second_octet = (second_octet % 255) - 1

                   first_octet = first_octet + 1

                   if first_octet > 255:

                       print("No more available IP!")

                       break

       print(str(first_octet) + "." + str(second_octet) + "." + str(third_octet) + "." + str(forth_octet))

else:

   print("Invalid input!")

Explanation:

- Ask the user for the octets

- Initialize the start and end points of the loop, since we will be printing next 5 IP range is set accordingly

- Check if the octets meet the restrictions

- Inside the loop, increase the forth octet by 1 on each iteration

- Check if octets reach the limit - 255, if they are greater than 255, calculate the mod and subtract 1. Then increase the previous octet by 1.

For example, if the input is: 1. 1. 20. 255, next ones will be:

1. 1. 21. 0

1. 1. 21. 1

1. 1. 21. 2

1. 1. 21. 3

1. 1. 21. 4

There is an exception for the first octet, if it reaches 255 and others also reach 255, this means there are no IP available.

- Print the result

8 0
3 years ago
What are the consequences of having unprotected Linux operating systems installed on embedded systems?
Gennadij [26K]

Answer:

highly venerable to external attacks

Explanation:

Embedded systems are the type of computer systems that are specially designed having hardware and software components plus programmable  capabilities embedded into the hardware itself.

These computer systems are motorized by dedicated computer hardware chips made by companies such as Broadcom, Qualcomm, and Marvell. These chips are cheap which also means that they’re highly vulnerable, and the profit margins slim. They normally put a version of the Linux operating system onto the chips, lumping it up with some other bunch of open-source and proprietary components and drivers. With little or no technical engineering work before shipping, and there's little enticement to update their "board support package" until there’s probably a very good reason for it.

6 0
3 years ago
write a program, using python, to determine the mean, median, and standard deviation of a list of numbers. In addition, count th
Mekhanik [1.2K]

Answer:

The program to this question can be given as:

Program:

import math   #import packages

import sys

number =  [3, 6, 7, 2, 8, 9, 2, 3, 7, 4, 5, 9, 2, 1, 6, 9, 6]  #define list  

n = len(number)   # taking length of list

print("Sample Data: ",number)  #print list

#find Mean

print("Mean is: ")  #message  

add = sum(number)  # addition of numbers.

mean = add / n  #add divide by total list number.

print(str(mean))  #print mean

number.sort()   #short list by using sort function

#find Median

print("Median is: ")

if n % 2 == 0:        #conditional statement.

   median1 = number[n//2]  

   median2 = number[n//2 - 1]  

   median = (median1 + median2)/2

else:  

   median = number[n//2]  

print(str(median)) #print median

#find Standard deviation.

print("Standard Deviation :")

def SD(number):  #define function SD

   if n <= 1:      #check condition

       return 0.0   #return value.

   mean,SD = average(number), 0.0  

   # find Standard deviation(SD).

   for j in number:

       SD =SD+(float(j)-mean)**2

       #calculate Standard deviation holing in variable SD  

       SD =math.sqrt((SD)/float(n-1))#using math sqrt function.

   return SD  #return value.

def average(av):         #define function average

   n,mean =len(av), 0.0  

   if n <= 1:

       return av[0]   #return value.

   # calculate average

   for I in av:

       mean +=float(i)

       mean /= float(n)

   return mean             #return value.

print(SD(number)) #print value

Output:

Sample Data:  [3, 6, 7, 2, 8, 9, 2, 3, 7, 4, 5, 9, 2, 1, 6, 9, 6]

Mean is:  

5.235294117647059

Median is:  

6

Standard Deviation :

2.140859045465338

Explanation:

In the above python program first, we import packages to perform maths and other functions. Then we declare the list that is number in the list the elements are given in the question. Then we declare variable n in this variable we take the number of elements present in the list and print the list first. In the list, we perform three operations that can be given as:

Mean:  

In the mean operation firstly we define the variable add in this variable we add all elements of the list by using the math sum function then we divide the number by number of elements present in the list. and sore the value in the mean variable and print it.

Median:

In the median section firstly we sort the list by using the sort function. Then we use the conditional statements for calculating median. In the if block first we modules the number by 2 if it gives 0. it calculates first and second median the add-in median .else it will print that number.

Standard Deviation:

In the standard deviation part first, we define two functions that is SD() function and average().In the SD() function we pass the list as the parameter. In this function we use the conditional statement in the if block we call the average() function and use for loop for return all values. In the average() function we calculate the average of the all number and return value. At last, we print all values.

7 0
3 years ago
Super Easy !!! Which of the following is one of the most primary maintenance steps for software?
charle [14.2K]

Answer:

keeping software programs up-to-date

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Danny is editing the text content of a single page on a website he created a year ago. What part of the tag would he have to upd
    11·1 answer
  • How do you uninstall a program using the Control Panel?
    10·1 answer
  • Network administrators ____ to set up the browsers on the network to use a proxy server.
    12·1 answer
  • Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability o
    6·1 answer
  • you are concerned with security at your company and want to implement a technology that requires no configuring on the users sid
    15·1 answer
  • Olivia is trying to save for a new laptop computer. To help her save, she should start a _____. database financial statement per
    7·2 answers
  • 2.8 Code Practice: Question 2
    11·1 answer
  • 3. Wi-fi connections have limited range of :
    9·1 answer
  • A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the
    10·2 answers
  • Besides a soho router, which of these devices is a network printer most likely to be connected to? a. router b. server c. workst
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!