Utilize este identificador para referenciar este registo: http://hdl.handle.net/10071/25825
Registo completo
Campo DCValorIdioma
dc.contributor.authorSerrão, C.-
dc.contributor.authorDinis, B-
dc.contributor.editorCharles A. Shoniregun-
dc.contributor.editorGalyna A. Akmayeva-
dc.date.accessioned2022-07-15T08:39:37Z-
dc.date.available2022-07-15T08:39:37Z-
dc.date.issued2014-
dc.identifier.citationSerrão, C., Dinis, B.(2014).External footprinting security assessments: Combining the PTES framework with open-source tools to conduct external footprinting security assessments. Em Charles A. Shoniregun, Galyna A. Akmayeva (Eds.), Proceedings of the IEEE International Conference on Information Society (i-Society 2014). IEEE. 10.1109/i-Society.2014.7009066-
dc.identifier.isbn978-1-908320-36-0-
dc.identifier.urihttp://hdl.handle.net/10071/25825-
dc.description.abstractsecurity assessment activity (either legitimate or not) consists in the information gathering about a specific target. Information gathering, also recognized as footprinting, is the process of collecting all accessible information about that specific target. In a security assessment, the importance of this phase is clamorous and involves the examination, collection and classification of large volumes of data from the target network. The Penetration Testing Execution Standard (PTES), although still in an early and definition stage, provides the description of the processes that are necessary to conduct penetration-testing assessments in a generic and integrated manner. The focus of this article consists in the analysis of the PTES and its recommendations on what concerns footprinting processes and to provide some contributions in terms of the practical applicability of the PTES recommendations.eng
dc.language.isoeng-
dc.publisherIEEE-
dc.relationUID/MULTI/0446/2013-
dc.relation.ispartofProceedings of the IEEE International Conference on Information Society (i-Society 2014)-
dc.rightsopenAccess-
dc.subjectPenetration testingeng
dc.subjectPentestseng
dc.subjectNetwork vulnerabilitieseng
dc.subjectPTESeng
dc.subjectFootprintingeng
dc.titleExternal footprinting security assessments: Combining the PTES framework with open-source tools to conduct external footprinting security assessmentseng
dc.typeconferenceObject-
dc.event.typeConferênciapt
dc.event.locationLondoneng
dc.event.date2014-
dc.peerreviewedyes-
dc.date.updated2022-06-28T09:29:20Z-
dc.description.versioninfo:eu-repo/semantics/acceptedVersion-
dc.identifier.doi10.1109/i-Society.2014.7009066-
dc.subject.fosDomínio/Área Científica::Ciências Naturais::Ciências Físicaspor
iscte.identifier.cienciahttps://ciencia.iscte-iul.pt/id/ci-pub-20734-
iscte.alternateIdentifiers.wosWOS:000380487500051-
iscte.alternateIdentifiers.scopus2-s2.0-84923163743-
Aparece nas coleções:ISTAR-CRI - Comunicações a conferências internacionais

Ficheiros deste registo:
Ficheiro TamanhoFormato 
conferenceobject_20734.pdf11,04 MBAdobe PDFVer/Abrir


FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpaceOrkut
Formato BibTex mendeley Endnote Logotipo do DeGóis Logotipo do Orcid 

Todos os registos no repositório estão protegidos por leis de copyright, com todos os direitos reservados.