{"title":"安全性测试并不完全相同:参考分类法","authors":"Jim Kates","doi":"10.1080/10658989809342549","DOIUrl":null,"url":null,"abstract":"Security managers are always being offered new methods to test the security of their systems. Unfamiliarity with the terminology and types of testing can result in the manager not getting the services he or she is seeking. This article presents a taxonomy of terms in order to classify the different types of services available, and explain how each technique evaluates security controls in real-world settings.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Testing Is Not All The Same: A Reference Taxonomy\",\"authors\":\"Jim Kates\",\"doi\":\"10.1080/10658989809342549\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security managers are always being offered new methods to test the security of their systems. Unfamiliarity with the terminology and types of testing can result in the manager not getting the services he or she is seeking. This article presents a taxonomy of terms in order to classify the different types of services available, and explain how each technique evaluates security controls in real-world settings.\",\"PeriodicalId\":207082,\"journal\":{\"name\":\"Inf. Secur. J. A Glob. Perspect.\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Inf. Secur. J. A Glob. Perspect.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/10658989809342549\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/10658989809342549","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Testing Is Not All The Same: A Reference Taxonomy
Security managers are always being offered new methods to test the security of their systems. Unfamiliarity with the terminology and types of testing can result in the manager not getting the services he or she is seeking. This article presents a taxonomy of terms in order to classify the different types of services available, and explain how each technique evaluates security controls in real-world settings.