Analysis of computer system penetration testing methods for assessing the quality of user banking data protection.

Keywords: penetration testing, testing, protection of bank user data, penetration into computer systems, testing methods.

Abstract

The article contains a review of the main approaches to computer system penetration testing, data interception. The paper describes and analyzes security testing standards, describes the preparation plan for testing, execution and preparation of the results of the work

References

Bortnik K.Y., Delyavskiy M.V., Kuzmich O.I., Bagnyuk N.V., Chernyashchuk N.L. (2020) Basic threats to security of information systems. // Scientific journal "Computer-Interactive Technologies: Education, Science, and Production" (pp. 136-141). (Vol. 41) Lutsk: LSTU Publishing House [in Ukrainian].

Bortnik K.Y., Lominska G.Y. (2018) Technologii analizu analizu naslidkiv kiberatakov // Scientific journal "Computer-integrated technologies: education, science, production" (pp.10-13). (Vols. 30-31). Lutsk: Publishing house LNTU [in Ukrainian].

What You Need to Know About OSSTMM [Electronic resource] - Mode of access to the resource: https://kirkpatrickprice.com/blog/what-you-need-to-know-about-osstmm/.

COMPUTER SECURITY RESOURCE CENTER [Electronic resource] - Access mode to the resource: https://csrc.nist.gov/publications/.

Penetration Testing Methodologies [Electronic resource] - Accessible from: https://owasp.org/www-project-web-security-testing-guide/v41/3-The_OWASP_Testing_Framework/1-Penetration_Testing_Methodologies.

OWASP Web Security Testing Guide [Electronic resource] - Access mode to the resource: https://owasp.org/www-project-web-security-testing-guide/.

PTES Technical Guidelines [Electronic resource] - Accessible from http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines.

Abstract views: 0
PDF Downloads: 0
Published
2021-04-01
How to Cite
ShvayukА., Bortnyk К., & Нrinyuk S. (2021). Analysis of computer system penetration testing methods for assessing the quality of user banking data protection . COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (42), 218-222. https://doi.org/10.36910/6775-2524-0560-2021-42-31
Section
Computer science and computer engineering