Legal Implications Of Penetration Testing Essay

PAGES
2
WORDS
630
Cite

Penetration Testing The use of penetration testing to test the security and safety of a network is a common practice among many firms. It is further often normal to not inform the relevant staff and personnel behind a network about what is about to occur so that they are truly tested based on what they would normally be doing. However, there are legal and other minefields to doing such testing and all of the people involved need to be careful to cross all the t's and dot the I's before getting too deep into such testing. While penetration testing needs to be as complete and realistic as possible, there are some precautions and other steps that must be taken.

Best Practices

As one might expect, the big thing to have when it comes to penetration testing is permission to so do. However, it is important to define what that means in the context of a "surprise" penetration testing instance. Indeed, the standards relating to this are set in many respects by an organization known as the SANS institute. The group suggests all of the following:

• Make sure to have the auditor doing the penetration testing be represented by legal counsel. This will lead to the invocation of attorney/client privilege should it be needed

...

Obvious times to avoid are month-end processing and other peak times or operating hours
• The audit and the situations it creates should not create more problems than it solves

• There should be very firm and specific agreement (in writing) on what the auditor is allowed to do, what data that they are allowed to maintain and so forth (Kassner, 2015).

The above is more of a general guideline. As one might expect, there are often state-specific laws that may or may not apply, depending on the situation. When it comes to the state of Hawaii, the relevant charges that exist are referred to as computer damage in the first degree and computer fraud in the second degree. Obviously, an auditor will be wise to not commit the below acts while engaging in their penetration testing:

Computer damage in the first degree is typified by one or more of the following:

• Knowingly causes the transmission of a program, information, code or command that causes unauthorized damage

•…

Sources Used in Documents:

References

Iron Geek. (2017). State Hacking/Computer Security Laws. Irongeek.com. Retrieved 8 May 2017, from https://www.irongeek.com/i.php?page=computerlaws/state-hacking-laws

Kassner, M. (2017). Don't let a penetration test land you in legal hot water - TechRepublic. TechRepublic. Retrieved 8 May 2017, from http://www.techrepublic.com/article/dont-let-a-penetration-test-land-you-in-legal-hot-water/


Cite this Document:

"Legal Implications Of Penetration Testing" (2017, May 07) Retrieved May 4, 2024, from
https://www.paperdue.com/essay/legal-implications-of-penetration-testing-2165344

"Legal Implications Of Penetration Testing" 07 May 2017. Web.4 May. 2024. <
https://www.paperdue.com/essay/legal-implications-of-penetration-testing-2165344>

"Legal Implications Of Penetration Testing", 07 May 2017, Accessed.4 May. 2024,
https://www.paperdue.com/essay/legal-implications-of-penetration-testing-2165344

Related Documents

Computer IT Security Implementation Provide a summary of the actual development of your project. Because small corporations have to work under conditions of conflicting information technology in many instances, the requirement of maintaining these systems details entails far too many time-consuming processes that have to be carried out. This allows for the business to work in a logical order and promotes a more logical approach to the making of business decisions. The end

5 billion (a$28.2 billion) in 2008 (IKW, 2009). The Germans have a long history in the business, with "eau de Cologne" being invented in Koln 210 years ago (IKW, 2009). The German market is continuing to grow slowly, despite economic challenges, recording 10.5% growth since 2004 (Ibid.). There are approximately 525 firms in the industry in Germany, ranging from large international enterprises to small boutique cosmetic and fragrance houses. The industry

The student has provided research on various vibration analytic techniques such as the use of Laser Vibrometry for Damage Detection using Lamb Waves in discovery processes to detect microcracks. Outcome 3. The Information Literacy competency was satisfied through the research efforts made by the student through data gathering regarding aircraft structures and vibrations qualification techniques retrieved from the MIL-STD-810F and NASA Langley Research Laboratory. Techniques include Fatigue Damage Spectrum (FDS)

XBRL Adoption at Hmrc and
PAGES 55 WORDS 17839

Within these findings are many insights and differences in opinion as to the benefits and caveats of XBRL adoption. In the a case of HMRC, privacy issues are a key factor in the reason for their partial adoption of XBRL, rather than the full adoption undertaken by CH. The interviewees were from varied backgrounds and included three from HMRC and four from CH. They included persons from many different

Ashley, Assistant Director, Criminal Investigative Division of the FBI relates that in 1991: "...the U.S. Attorney's office in Los Angeles charged 13 defendants in a $1 billion false medical billing scheme that was headed by two Russian emigre brothers. On September 20, 1994, the alleged ringleader was sentenced to 21 years in prison for fraud, conspiracy, racketeering, and money laundering. He was also ordered to forfeit $50 million in

This balkanization is partially driven by the lack of integration between various segments of itself, and this is primarily a technological limitation. Yet the far broader and more difficult challenge in this regard is the segregating of knowledge not just for profit, but for lasting competitive advantage between nations. On the one hand there is the need for competitive differentiation in company's offerings, yet in others including the sharing