SlideShare a Scribd company logo
1 of 1
Download to read offline
Company management has asked that you compare the OSSTMM and the PTES in order to
determine which methodology to select for internal testing. Compare these two methodologies
and explain in detail about both.
Solution
Penetration testing has several methodologies-OSSTMM and PTES is one of them.
Basic comparison between OSSTMM and PTES are as follows -
Penetration testing methodoogy
Penetration Testing Execution Standard (PTES) :There are 7 phases which is used to define
PTES for penetration testing.
1)Pre-engagement Interactions
2)Intelligence Gathering
3)Threat Modeling
4)Vulnerability Analysis
5)Exploitation
6)Post Exploitation
7)Reporting
On the other hand,OSSTMM is used for performing penetration testing and to obtain security
metrics.The OSSTMM provides transparency to those who have inadequate security
configurations and policies.The OSSTMM includes the entire risk assessment process starting
from requirement analysis to report creation.
The six areas covered by OSSTMM are -
1)Information security
2)Process security
3)Internet technology security
4)Communications security
5)Wireless security
6)Physical securityOSSTMMPTESMore TheoreticalTechnology orientedSecurity assessment
methodology
Penetration testing methodoogyMetrics basedExtended analysis of all stages

More Related Content

Similar to Company management has asked that you compare the OSSTMM and the PTE.pdf

pentration testing.pdf
pentration testing.pdfpentration testing.pdf
pentration testing.pdfRamya Nellutla
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)MetroStar
 
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKPROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKIJCSEA Journal
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxResponses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxronak56
 
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoJinElias52
 
Reliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxReliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxcarlt4
 
A Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection SystemA Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection SystemIJARIIE JOURNAL
 
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)IJARIIE JOURNAL
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELINGDESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELINGIJNSA Journal
 
RUNNING HEAD COMPREHENSIVE SECURITY 1COMPREHENSIVE SECURI.docx
RUNNING HEAD COMPREHENSIVE SECURITY  1COMPREHENSIVE SECURI.docxRUNNING HEAD COMPREHENSIVE SECURITY  1COMPREHENSIVE SECURI.docx
RUNNING HEAD COMPREHENSIVE SECURITY 1COMPREHENSIVE SECURI.docxsusanschei
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxflorriezhamphrey3065
 
Penetration testing 5 reasons Why Organizations Should Adopt it
Penetration testing   5 reasons Why Organizations Should Adopt itPenetration testing   5 reasons Why Organizations Should Adopt it
Penetration testing 5 reasons Why Organizations Should Adopt itTestingXperts
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancementcyberprosocial
 

Similar to Company management has asked that you compare the OSSTMM and the PTE.pdf (20)

pentration testing.pdf
pentration testing.pdfpentration testing.pdf
pentration testing.pdf
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKPROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxResponses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docx
 
Ijetr042329
Ijetr042329Ijetr042329
Ijetr042329
 
5757912.ppt
5757912.ppt5757912.ppt
5757912.ppt
 
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
 
Reliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxReliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docx
 
A Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection SystemA Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection System
 
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
 
50120140501001
5012014050100150120140501001
50120140501001
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELINGDESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
RUNNING HEAD COMPREHENSIVE SECURITY 1COMPREHENSIVE SECURI.docx
RUNNING HEAD COMPREHENSIVE SECURITY  1COMPREHENSIVE SECURI.docxRUNNING HEAD COMPREHENSIVE SECURITY  1COMPREHENSIVE SECURI.docx
RUNNING HEAD COMPREHENSIVE SECURITY 1COMPREHENSIVE SECURI.docx
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
 
Penetration testing 5 reasons Why Organizations Should Adopt it
Penetration testing   5 reasons Why Organizations Should Adopt itPenetration testing   5 reasons Why Organizations Should Adopt it
Penetration testing 5 reasons Why Organizations Should Adopt it
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
 

More from feroz544

Case studyInitial history27-year-old female comlaining of sympto.pdf
Case studyInitial history27-year-old female comlaining of sympto.pdfCase studyInitial history27-year-old female comlaining of sympto.pdf
Case studyInitial history27-year-old female comlaining of sympto.pdfferoz544
 
I appreciate any help with the following questions.(1)    What typ.pdf
I appreciate any help with the following questions.(1)    What typ.pdfI appreciate any help with the following questions.(1)    What typ.pdf
I appreciate any help with the following questions.(1)    What typ.pdfferoz544
 
How do the IPv6 autoconfiguration and numbering features work What .pdf
How do the IPv6 autoconfiguration and numbering features work What .pdfHow do the IPv6 autoconfiguration and numbering features work What .pdf
How do the IPv6 autoconfiguration and numbering features work What .pdfferoz544
 
Government Audits & Fraud Reporting For discussion During an audit .pdf
Government Audits & Fraud Reporting For discussion During an audit .pdfGovernment Audits & Fraud Reporting For discussion During an audit .pdf
Government Audits & Fraud Reporting For discussion During an audit .pdfferoz544
 
Given L1 and Prove a llb are supplementary. 3 2 Proof It is given .pdf
Given L1 and Prove a llb are supplementary. 3 2 Proof It is given .pdfGiven L1 and Prove a llb are supplementary. 3 2 Proof It is given .pdf
Given L1 and Prove a llb are supplementary. 3 2 Proof It is given .pdfferoz544
 
Explain viewing the nonprofit organization as an economic entity and.pdf
Explain viewing the nonprofit organization as an economic entity and.pdfExplain viewing the nonprofit organization as an economic entity and.pdf
Explain viewing the nonprofit organization as an economic entity and.pdfferoz544
 
Explain the concept and cause of freezing point depression. Elaborat.pdf
Explain the concept and cause of freezing point depression. Elaborat.pdfExplain the concept and cause of freezing point depression. Elaborat.pdf
Explain the concept and cause of freezing point depression. Elaborat.pdfferoz544
 
could you implement this function please, im having issues with it..pdf
could you implement this function please, im having issues with it..pdfcould you implement this function please, im having issues with it..pdf
could you implement this function please, im having issues with it..pdfferoz544
 
As people engage in more international travel and become more famili.pdf
As people engage in more international travel and become more famili.pdfAs people engage in more international travel and become more famili.pdf
As people engage in more international travel and become more famili.pdfferoz544
 
Consider a l-D elastic bar problem defined on [0, 4]. The domain .pdf
Consider a l-D elastic bar problem defined on [0, 4]. The domain .pdfConsider a l-D elastic bar problem defined on [0, 4]. The domain .pdf
Consider a l-D elastic bar problem defined on [0, 4]. The domain .pdfferoz544
 
Click to add title 2. Explain the nature of the social structurecast.pdf
Click to add title 2. Explain the nature of the social structurecast.pdfClick to add title 2. Explain the nature of the social structurecast.pdf
Click to add title 2. Explain the nature of the social structurecast.pdfferoz544
 
Based on the following data, what is the working capital Accounts p.pdf
Based on the following data, what is the working capital Accounts p.pdfBased on the following data, what is the working capital Accounts p.pdf
Based on the following data, what is the working capital Accounts p.pdfferoz544
 
who are the people that steal cashSolutionPeople that steal c.pdf
who are the people that steal cashSolutionPeople that steal c.pdfwho are the people that steal cashSolutionPeople that steal c.pdf
who are the people that steal cashSolutionPeople that steal c.pdfferoz544
 
Why is nucleotide synthesis an important pathway for medical interve.pdf
Why is nucleotide synthesis an important pathway for medical interve.pdfWhy is nucleotide synthesis an important pathway for medical interve.pdf
Why is nucleotide synthesis an important pathway for medical interve.pdfferoz544
 
Why do some argue that the Fed made the Great Depression worse S.pdf
Why do some argue that the Fed made the Great Depression worse S.pdfWhy do some argue that the Fed made the Great Depression worse S.pdf
Why do some argue that the Fed made the Great Depression worse S.pdfferoz544
 
Which of the following is a characteristic of TQMI. A focus on th.pdf
Which of the following is a characteristic of TQMI. A focus on th.pdfWhich of the following is a characteristic of TQMI. A focus on th.pdf
Which of the following is a characteristic of TQMI. A focus on th.pdfferoz544
 
Which of the following wireless standards uses direct sequence sprea.pdf
Which of the following wireless standards uses direct sequence sprea.pdfWhich of the following wireless standards uses direct sequence sprea.pdf
Which of the following wireless standards uses direct sequence sprea.pdfferoz544
 
A 0.28 mol sample of a weak acid with an unknown pKa was combined wi.pdf
A 0.28 mol sample of a weak acid with an unknown pKa was combined wi.pdfA 0.28 mol sample of a weak acid with an unknown pKa was combined wi.pdf
A 0.28 mol sample of a weak acid with an unknown pKa was combined wi.pdfferoz544
 
What was the first primate to have Y-5 molar pattern GibbonsSol.pdf
What was the first primate to have Y-5 molar pattern  GibbonsSol.pdfWhat was the first primate to have Y-5 molar pattern  GibbonsSol.pdf
What was the first primate to have Y-5 molar pattern GibbonsSol.pdfferoz544
 
What special problems does ECB confront A. The ECB must function w.pdf
What special problems does ECB confront A. The ECB must function w.pdfWhat special problems does ECB confront A. The ECB must function w.pdf
What special problems does ECB confront A. The ECB must function w.pdfferoz544
 

More from feroz544 (20)

Case studyInitial history27-year-old female comlaining of sympto.pdf
Case studyInitial history27-year-old female comlaining of sympto.pdfCase studyInitial history27-year-old female comlaining of sympto.pdf
Case studyInitial history27-year-old female comlaining of sympto.pdf
 
I appreciate any help with the following questions.(1)    What typ.pdf
I appreciate any help with the following questions.(1)    What typ.pdfI appreciate any help with the following questions.(1)    What typ.pdf
I appreciate any help with the following questions.(1)    What typ.pdf
 
How do the IPv6 autoconfiguration and numbering features work What .pdf
How do the IPv6 autoconfiguration and numbering features work What .pdfHow do the IPv6 autoconfiguration and numbering features work What .pdf
How do the IPv6 autoconfiguration and numbering features work What .pdf
 
Government Audits & Fraud Reporting For discussion During an audit .pdf
Government Audits & Fraud Reporting For discussion During an audit .pdfGovernment Audits & Fraud Reporting For discussion During an audit .pdf
Government Audits & Fraud Reporting For discussion During an audit .pdf
 
Given L1 and Prove a llb are supplementary. 3 2 Proof It is given .pdf
Given L1 and Prove a llb are supplementary. 3 2 Proof It is given .pdfGiven L1 and Prove a llb are supplementary. 3 2 Proof It is given .pdf
Given L1 and Prove a llb are supplementary. 3 2 Proof It is given .pdf
 
Explain viewing the nonprofit organization as an economic entity and.pdf
Explain viewing the nonprofit organization as an economic entity and.pdfExplain viewing the nonprofit organization as an economic entity and.pdf
Explain viewing the nonprofit organization as an economic entity and.pdf
 
Explain the concept and cause of freezing point depression. Elaborat.pdf
Explain the concept and cause of freezing point depression. Elaborat.pdfExplain the concept and cause of freezing point depression. Elaborat.pdf
Explain the concept and cause of freezing point depression. Elaborat.pdf
 
could you implement this function please, im having issues with it..pdf
could you implement this function please, im having issues with it..pdfcould you implement this function please, im having issues with it..pdf
could you implement this function please, im having issues with it..pdf
 
As people engage in more international travel and become more famili.pdf
As people engage in more international travel and become more famili.pdfAs people engage in more international travel and become more famili.pdf
As people engage in more international travel and become more famili.pdf
 
Consider a l-D elastic bar problem defined on [0, 4]. The domain .pdf
Consider a l-D elastic bar problem defined on [0, 4]. The domain .pdfConsider a l-D elastic bar problem defined on [0, 4]. The domain .pdf
Consider a l-D elastic bar problem defined on [0, 4]. The domain .pdf
 
Click to add title 2. Explain the nature of the social structurecast.pdf
Click to add title 2. Explain the nature of the social structurecast.pdfClick to add title 2. Explain the nature of the social structurecast.pdf
Click to add title 2. Explain the nature of the social structurecast.pdf
 
Based on the following data, what is the working capital Accounts p.pdf
Based on the following data, what is the working capital Accounts p.pdfBased on the following data, what is the working capital Accounts p.pdf
Based on the following data, what is the working capital Accounts p.pdf
 
who are the people that steal cashSolutionPeople that steal c.pdf
who are the people that steal cashSolutionPeople that steal c.pdfwho are the people that steal cashSolutionPeople that steal c.pdf
who are the people that steal cashSolutionPeople that steal c.pdf
 
Why is nucleotide synthesis an important pathway for medical interve.pdf
Why is nucleotide synthesis an important pathway for medical interve.pdfWhy is nucleotide synthesis an important pathway for medical interve.pdf
Why is nucleotide synthesis an important pathway for medical interve.pdf
 
Why do some argue that the Fed made the Great Depression worse S.pdf
Why do some argue that the Fed made the Great Depression worse S.pdfWhy do some argue that the Fed made the Great Depression worse S.pdf
Why do some argue that the Fed made the Great Depression worse S.pdf
 
Which of the following is a characteristic of TQMI. A focus on th.pdf
Which of the following is a characteristic of TQMI. A focus on th.pdfWhich of the following is a characteristic of TQMI. A focus on th.pdf
Which of the following is a characteristic of TQMI. A focus on th.pdf
 
Which of the following wireless standards uses direct sequence sprea.pdf
Which of the following wireless standards uses direct sequence sprea.pdfWhich of the following wireless standards uses direct sequence sprea.pdf
Which of the following wireless standards uses direct sequence sprea.pdf
 
A 0.28 mol sample of a weak acid with an unknown pKa was combined wi.pdf
A 0.28 mol sample of a weak acid with an unknown pKa was combined wi.pdfA 0.28 mol sample of a weak acid with an unknown pKa was combined wi.pdf
A 0.28 mol sample of a weak acid with an unknown pKa was combined wi.pdf
 
What was the first primate to have Y-5 molar pattern GibbonsSol.pdf
What was the first primate to have Y-5 molar pattern  GibbonsSol.pdfWhat was the first primate to have Y-5 molar pattern  GibbonsSol.pdf
What was the first primate to have Y-5 molar pattern GibbonsSol.pdf
 
What special problems does ECB confront A. The ECB must function w.pdf
What special problems does ECB confront A. The ECB must function w.pdfWhat special problems does ECB confront A. The ECB must function w.pdf
What special problems does ECB confront A. The ECB must function w.pdf
 

Recently uploaded

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Recently uploaded (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Company management has asked that you compare the OSSTMM and the PTE.pdf

  • 1. Company management has asked that you compare the OSSTMM and the PTES in order to determine which methodology to select for internal testing. Compare these two methodologies and explain in detail about both. Solution Penetration testing has several methodologies-OSSTMM and PTES is one of them. Basic comparison between OSSTMM and PTES are as follows - Penetration testing methodoogy Penetration Testing Execution Standard (PTES) :There are 7 phases which is used to define PTES for penetration testing. 1)Pre-engagement Interactions 2)Intelligence Gathering 3)Threat Modeling 4)Vulnerability Analysis 5)Exploitation 6)Post Exploitation 7)Reporting On the other hand,OSSTMM is used for performing penetration testing and to obtain security metrics.The OSSTMM provides transparency to those who have inadequate security configurations and policies.The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation. The six areas covered by OSSTMM are - 1)Information security 2)Process security 3)Internet technology security 4)Communications security 5)Wireless security 6)Physical securityOSSTMMPTESMore TheoreticalTechnology orientedSecurity assessment methodology Penetration testing methodoogyMetrics basedExtended analysis of all stages