Shamal Faily
Ethical hazards and safeguards in penetration testing.
Faily, Shamal; Iacob, Claudia; Field, Sarah
Authors
Claudia Iacob
Sarah Field
Abstract
Penetration testing entails attacking a system to identify and report insecurity, but doing so without harming the system nor encroaching on the dignity of those affected by it. To improve the interaction between penetration testers and their processes and technology, we need to understand the factors that affect decisions they make with ethical import. This paper presents four ethical hazards faced by penetration testers, and three safeguards that address them. We also present preliminary results validating the hazards and safeguards.
Citation
FAILY, S., IACOB, C. and FIELD, S. 2016. Ethical hazards and safeguards in penetration testing. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 83. Available from: https://doi.org/10.14236/ewic/HCI2016.83
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 30th International BCS human computer interaction conference (HCI 2016): fusion |
Start Date | Jul 11, 2016 |
End Date | Jul 15, 2016 |
Acceptance Date | Jul 11, 2016 |
Online Publication Date | Jul 31, 2016 |
Publication Date | Jul 31, 2016 |
Deposit Date | Dec 7, 2021 |
Publicly Available Date | Dec 7, 2021 |
Publisher | BCS, The Chartered Institute for IT |
Peer Reviewed | Peer Reviewed |
Series Title | Electronic workshops in computing |
Series ISSN | 1477-9358 |
DOI | https://doi.org/10.14236/ewic/HCI2016.83 |
Keywords | Penetration testing; Systems security; Hacking; Ethics and computing; Personas |
Public URL | https://rgu-repository.worktribe.com/output/1437927 |
Files
FAILY 2016 Ethical hazards and safeguards
(1 Mb)
PDF
Publisher Licence URL
https://creativecommons.org/licenses/by/4.0/
You might also like
Privacy goals for the data lifecycle.
(2022)
Journal Article
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
Evaluating privacy: determining user privacy expectations on the web.
(2021)
Journal Article
DPIA in context: applying DPIA to assess privacy risks of cyber physical systems.
(2020)
Journal Article
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search