Please use this identifier to cite or link to this item: http://hdl.handle.net/10071/25825
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSerrão, C.-
dc.contributor.authorDinis, B-
dc.contributor.editorCharles A. Shoniregun-
dc.contributor.editorGalyna A. Akmayeva-
dc.date.accessioned2022-07-15T08:39:37Z-
dc.date.available2022-07-15T08:39:37Z-
dc.date.issued2014-
dc.identifier.citationSerrão, C., Dinis, B.(2014).External footprinting security assessments: Combining the PTES framework with open-source tools to conduct external footprinting security assessments. Em Charles A. Shoniregun, Galyna A. Akmayeva (Eds.), Proceedings of the IEEE International Conference on Information Society (i-Society 2014). IEEE. 10.1109/i-Society.2014.7009066-
dc.identifier.isbn978-1-908320-36-0-
dc.identifier.urihttp://hdl.handle.net/10071/25825-
dc.description.abstractsecurity assessment activity (either legitimate or not) consists in the information gathering about a specific target. Information gathering, also recognized as footprinting, is the process of collecting all accessible information about that specific target. In a security assessment, the importance of this phase is clamorous and involves the examination, collection and classification of large volumes of data from the target network. The Penetration Testing Execution Standard (PTES), although still in an early and definition stage, provides the description of the processes that are necessary to conduct penetration-testing assessments in a generic and integrated manner. The focus of this article consists in the analysis of the PTES and its recommendations on what concerns footprinting processes and to provide some contributions in terms of the practical applicability of the PTES recommendations.eng
dc.language.isoeng-
dc.publisherIEEE-
dc.relationUID/MULTI/0446/2013-
dc.relation.ispartofProceedings of the IEEE International Conference on Information Society (i-Society 2014)-
dc.rightsopenAccess-
dc.subjectPenetration testingeng
dc.subjectPentestseng
dc.subjectNetwork vulnerabilitieseng
dc.subjectPTESeng
dc.subjectFootprintingeng
dc.titleExternal footprinting security assessments: Combining the PTES framework with open-source tools to conduct external footprinting security assessmentseng
dc.typeconferenceObject-
dc.event.typeConferênciapt
dc.event.locationLondoneng
dc.event.date2014-
dc.peerreviewedyes-
dc.date.updated2022-06-28T09:29:20Z-
dc.description.versioninfo:eu-repo/semantics/acceptedVersion-
dc.identifier.doi10.1109/i-Society.2014.7009066-
dc.subject.fosDomínio/Área Científica::Ciências Naturais::Ciências Físicaspor
iscte.identifier.cienciahttps://ciencia.iscte-iul.pt/id/ci-pub-20734-
iscte.alternateIdentifiers.wosWOS:000380487500051-
iscte.alternateIdentifiers.scopus2-s2.0-84923163743-
Appears in Collections:ISTAR-CRI - Comunicações a conferências internacionais

Files in This Item:
File SizeFormat 
conferenceobject_20734.pdf11,04 MBAdobe PDFView/Open


FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpaceOrkut
Formato BibTex mendeley Endnote Logotipo do DeGóis Logotipo do Orcid 

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.