scholarly journals Efficacy of Unconventional Penetration Testing Practices

2022 ◽  
Vol 31 (1) ◽  
pp. 223-239
Author(s):  
Bandar Abdulrhman Bin Arfaj ◽  
Shailendra Mishra ◽  
Mohammed AlShehri
1999 ◽  
Vol 15 (2) ◽  
pp. 151-157 ◽  
Author(s):  
José Muñiz ◽  
Gerardo Prieto ◽  
Leandro Almeida ◽  
Dave Bartram

Summary: The two main sources of errors in educational and psychological evaluation are the lack of adequate technical and psychometric characteristics of the tests, and especially the failure to properly implement the testing process. The main goal of the present research is to study the situation of test construction and test use in the Spanish-speaking (Spain and Latin American countries) and Portuguese-speaking (Portugal and Brazil) countries. The data were collected using a questionnaire constructed by the European Federation of Professional Psychologists Association (EFPPA) Task Force on Tests and Testing, under the direction of D. Bartram . In addition to the questionnaire, other ad hoc data were also gathered. Four main areas of psychological testing were investigated: Educational, Clinical, Forensic and Work. Key persons were identified in each country in order to provide reliable information. The main results are presented, and some measures that could be taken in order to improve the current testing practices in the countries surveyed are discussed. As most of the tests used in these countries were originally developed in other cultures, a problem that appears to be especially relevant is the translation and adaptation of tests.


1989 ◽  
Vol 44 (7) ◽  
pp. 1062-1067 ◽  
Author(s):  
John J. Fremer ◽  
Esther E. Diamond ◽  
Wayne J. Camara
Keyword(s):  

2018 ◽  
Vol 8 (3) ◽  
pp. 107 ◽  
Author(s):  
Kyungju Lee ◽  
Ja-Hyun Jang ◽  
Seung-Tae Lee ◽  
Kyong-Ah Yoon ◽  
Eun Sook Lee ◽  
...  

Author(s):  
Palak Aar ◽  
Aman Kumar Sharma

Penetration testing is defined as the procedure of imposing as an attacker to find out the vulnerabilities in a system that can be used to gain access to system for malicious use. This paper provides an overview of penetration testing and list out the criteria used to select the best tools for the given purpose. It also provides a brief description of the selected tools and furthermore we compare those tools. The results of the comparison are shown in terms of graphs and tables.


Sign in / Sign up

Export Citation Format

Share Document