logo

Penetration Testing Methodologies

   

Added on  2023-01-13

18 Pages3974 Words91 Views
Running head: PENETRATION TESTING METHODOLOGIES
PENETRATION TESTING METHODOLOGIES
Name of the student:
Name of the University:
Author Note:

1PENETRATION TESTING METHODOLOGIES
Table of Contents
Task 1...............................................................................................................................................2
Introduction......................................................................................................................................2
Discussion........................................................................................................................................2
Computer crime...............................................................................................................................2
Criminal activity..............................................................................................................................3
Hacking............................................................................................................................................4
Critical discussion............................................................................................................................4
References........................................................................................................................................5
Task 2...............................................................................................................................................8
Introduction......................................................................................................................................8
Discussion........................................................................................................................................8
Standard Operating Procedure or SOP:.....................................................................................9
Conclusion.....................................................................................................................................11
References......................................................................................................................................13
Appendix........................................................................................................................................16

2PENETRATION TESTING METHODOLOGIES
Task 1
Introduction
Computer hacking is modifying or doing practice of system or making changes in the
victim system as per the need. Person who perform this task is known as hacker (Lenca and
Haselager, 2016). Practice of such activity cannot be termed directly as illegal hacking, but
harming someone’s system or targeting industry or organization for the illegal demand such as
making effect to their system, asking for payment, taking personal data are such illegal activity
will be termed as hacking crime (Simmons, 2016). Criminal activity is performing task that
violates government law that will be punished by the court act. This paper will discuss for why
hacking is not criminal activity and for this it is very important to first understand what computer
crime is and what criminal activity is and after that there will be detail about hacking, how it
works what are the scope of hacking and what exact objective comes for hacking. After
understanding all these there will be conclusion that why hacking is not criminal activity.
Discussion
Computer crime
Computer crime is another word for cybercrime, Computer crime is an activity taking or
stealing illegally from someone’s computer or individual company information that maybe
private (Wilding, 2017). The performer of this task is termed as hacker. For some cases, hacker or
group of hackers just corrupt the files in the computer or in some cases, it destroys everything
(Zhuo et al, 2017). There are various kind of computer crime and all are having different needs,
demand, objective and different way of performing cybercrime (Söderberg and Delfanti, 2015).

3PENETRATION TESTING METHODOLOGIES
Few of examples are violation of copyright, cracking, malware attack, fraud, identity theft and
scam etc.
Traditional crime Computer crime
1. Traditional crime performed under
the presence of person at the place of
crime (van et al, 2017).
2. Traditional crime examples are theft,
forgery, blackmail etc.
3. Traditional crime do not require
computer or internet connection
1. Cybercrime do not require to be
present at the place of crime
2. Cybercrime examples are hacking,
stealing private data etc.
3. Computer crime requires computer
and internet connection.
Criminal activity
Criminal activity is the violation of law and rules by performing activity, which is against
court rules and regulation (Brown, 2015). Different country has different law and rules against
criminal activity. Criminal activity has various different rules for different activity. For computer
crime also comes under criminal activity as it is also against court rules and laws. There are
exceptions as well for some cases such as for mentally disturb person no penalty should impose.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Penetration Testing: Legality, SOP, and Penetration Test
|26
|3368
|66

Penetration Testing: Ethical and Legal Issues, Methodology, and Full Scale Testing in Kali Linux
|20
|2559
|88

Legality of Hacking: A Critical Discussion
|11
|4644
|27

Assignment on Ethical Hacking
|8
|2303
|56

Computer Crime: Definition, Correlation, and Criminal Activity
|6
|1263
|88

Ethical Hacking as a Defence Mechanism
|10
|1909
|378