SlideShare a Scribd company logo
"Testing Access Control"
Discuss the purpose of the security development life cycle and
how it is used for testing security systems. Using the Internet,
find two to three tools that could be used to conduct a
vulnerability assessment. Please include the web URL and share
with your classmates. Are paid tools more effective than open-
source tools? How does someone determine the best tool to use
for an assessment? Justify your answers.
Additional post options:
Should a company conduct their own pentest or should they pay
to have an outside company conduct the tests? Justify your
answer.

More Related Content

More from todd191

Testing Methodology Policy and Procedure (individual submission).docx
Testing Methodology Policy and Procedure (individual submission).docxTesting Methodology Policy and Procedure (individual submission).docx
Testing Methodology Policy and Procedure (individual submission).docx
todd191
 
Testing should include—at a minimum—unit, integration, and system .docx
Testing should include—at a minimum—unit, integration, and system .docxTesting should include—at a minimum—unit, integration, and system .docx
Testing should include—at a minimum—unit, integration, and system .docx
todd191
 
Test Your Innovation IQ Holly Green, Contributor Origina.docx
Test Your Innovation IQ Holly Green, Contributor Origina.docxTest Your Innovation IQ Holly Green, Contributor Origina.docx
Test Your Innovation IQ Holly Green, Contributor Origina.docx
todd191
 
testicular torsionPopulation most affected (ex Older Adul.docx
testicular torsionPopulation most affected (ex Older Adul.docxtesticular torsionPopulation most affected (ex Older Adul.docx
testicular torsionPopulation most affected (ex Older Adul.docx
todd191
 
Test the application in the Android Phone Emulator.Cre.docx
Test the application in the Android Phone Emulator.Cre.docxTest the application in the Android Phone Emulator.Cre.docx
Test the application in the Android Phone Emulator.Cre.docx
todd191
 
Tesla Motors strategy was no secret in 2006 the chairman and CEO.docx
Tesla Motors strategy was no secret in 2006 the chairman and CEO.docxTesla Motors strategy was no secret in 2006 the chairman and CEO.docx
Tesla Motors strategy was no secret in 2006 the chairman and CEO.docx
todd191
 
Tesla Motors Inc. SWOT AnalysisStrengths -The quality of .docx
Tesla Motors Inc. SWOT AnalysisStrengths  -The quality of .docxTesla Motors Inc. SWOT AnalysisStrengths  -The quality of .docx
Tesla Motors Inc. SWOT AnalysisStrengths -The quality of .docx
todd191
 
Tesla SolarCity CaseFIN 440Executive.docx
Tesla SolarCity CaseFIN 440Executive.docxTesla SolarCity CaseFIN 440Executive.docx
Tesla SolarCity CaseFIN 440Executive.docx
todd191
 
Test one, sp12TrueFalseIndicate whether the statement is t.docx
Test one, sp12TrueFalseIndicate whether the statement is t.docxTest one, sp12TrueFalseIndicate whether the statement is t.docx
Test one, sp12TrueFalseIndicate whether the statement is t.docx
todd191
 
TERRORIST RISING3Terrorist RisingColumbia .docx
TERRORIST RISING3Terrorist RisingColumbia .docxTERRORIST RISING3Terrorist RisingColumbia .docx
TERRORIST RISING3Terrorist RisingColumbia .docx
todd191
 
Test one, sp12TrueFalseIndicate whether the statement is true o.docx
Test one, sp12TrueFalseIndicate whether the statement is true o.docxTest one, sp12TrueFalseIndicate whether the statement is true o.docx
Test one, sp12TrueFalseIndicate whether the statement is true o.docx
todd191
 
Terrorism       In the workplaceSubmit a document in the fo.docx
Terrorism       In the workplaceSubmit a document in the fo.docxTerrorism       In the workplaceSubmit a document in the fo.docx
Terrorism       In the workplaceSubmit a document in the fo.docx
todd191
 
Test one, sp12 TrueFalse Indicate whether the statement is true or .docx
Test one, sp12 TrueFalse Indicate whether the statement is true or .docxTest one, sp12 TrueFalse Indicate whether the statement is true or .docx
Test one, sp12 TrueFalse Indicate whether the statement is true or .docx
todd191
 
Terrorism       In the workplaceSubmit a document in the format.docx
Terrorism       In the workplaceSubmit a document in the format.docxTerrorism       In the workplaceSubmit a document in the format.docx
Terrorism       In the workplaceSubmit a document in the format.docx
todd191
 
Terrorist Group HamasThe student is expected to do in-depth res.docx
Terrorist Group HamasThe student is expected to do in-depth res.docxTerrorist Group HamasThe student is expected to do in-depth res.docx
Terrorist Group HamasThe student is expected to do in-depth res.docx
todd191
 
ter 5Making Judgments©2012 NBCUniversal Media, LLCNBCU Phot.docx
ter 5Making Judgments©2012 NBCUniversal Media, LLCNBCU Phot.docxter 5Making Judgments©2012 NBCUniversal Media, LLCNBCU Phot.docx
ter 5Making Judgments©2012 NBCUniversal Media, LLCNBCU Phot.docx
todd191
 
Term Research Assignment FAQ’s This is an overview of ques.docx
Term Research Assignment FAQ’s This is an overview of ques.docxTerm Research Assignment FAQ’s This is an overview of ques.docx
Term Research Assignment FAQ’s This is an overview of ques.docx
todd191
 
TERM PROJECT ALTERNATIVE PLANS CHOOSE A PLAN SUPP.docx
TERM PROJECT ALTERNATIVE PLANS CHOOSE A PLAN SUPP.docxTERM PROJECT ALTERNATIVE PLANS CHOOSE A PLAN SUPP.docx
TERM PROJECT ALTERNATIVE PLANS CHOOSE A PLAN SUPP.docx
todd191
 
Test Module 3 Knowledge CheckQUESTION 1A 45-year-.docx
Test Module 3 Knowledge CheckQUESTION 1A 45-year-.docxTest Module 3 Knowledge CheckQUESTION 1A 45-year-.docx
Test Module 3 Knowledge CheckQUESTION 1A 45-year-.docx
todd191
 
Test is 25 minutes10 to 20 questionsThis timed quiz features.docx
Test is 25 minutes10 to 20 questionsThis timed quiz features.docxTest is 25 minutes10 to 20 questionsThis timed quiz features.docx
Test is 25 minutes10 to 20 questionsThis timed quiz features.docx
todd191
 

More from todd191 (20)

Testing Methodology Policy and Procedure (individual submission).docx
Testing Methodology Policy and Procedure (individual submission).docxTesting Methodology Policy and Procedure (individual submission).docx
Testing Methodology Policy and Procedure (individual submission).docx
 
Testing should include—at a minimum—unit, integration, and system .docx
Testing should include—at a minimum—unit, integration, and system .docxTesting should include—at a minimum—unit, integration, and system .docx
Testing should include—at a minimum—unit, integration, and system .docx
 
Test Your Innovation IQ Holly Green, Contributor Origina.docx
Test Your Innovation IQ Holly Green, Contributor Origina.docxTest Your Innovation IQ Holly Green, Contributor Origina.docx
Test Your Innovation IQ Holly Green, Contributor Origina.docx
 
testicular torsionPopulation most affected (ex Older Adul.docx
testicular torsionPopulation most affected (ex Older Adul.docxtesticular torsionPopulation most affected (ex Older Adul.docx
testicular torsionPopulation most affected (ex Older Adul.docx
 
Test the application in the Android Phone Emulator.Cre.docx
Test the application in the Android Phone Emulator.Cre.docxTest the application in the Android Phone Emulator.Cre.docx
Test the application in the Android Phone Emulator.Cre.docx
 
Tesla Motors strategy was no secret in 2006 the chairman and CEO.docx
Tesla Motors strategy was no secret in 2006 the chairman and CEO.docxTesla Motors strategy was no secret in 2006 the chairman and CEO.docx
Tesla Motors strategy was no secret in 2006 the chairman and CEO.docx
 
Tesla Motors Inc. SWOT AnalysisStrengths -The quality of .docx
Tesla Motors Inc. SWOT AnalysisStrengths  -The quality of .docxTesla Motors Inc. SWOT AnalysisStrengths  -The quality of .docx
Tesla Motors Inc. SWOT AnalysisStrengths -The quality of .docx
 
Tesla SolarCity CaseFIN 440Executive.docx
Tesla SolarCity CaseFIN 440Executive.docxTesla SolarCity CaseFIN 440Executive.docx
Tesla SolarCity CaseFIN 440Executive.docx
 
Test one, sp12TrueFalseIndicate whether the statement is t.docx
Test one, sp12TrueFalseIndicate whether the statement is t.docxTest one, sp12TrueFalseIndicate whether the statement is t.docx
Test one, sp12TrueFalseIndicate whether the statement is t.docx
 
TERRORIST RISING3Terrorist RisingColumbia .docx
TERRORIST RISING3Terrorist RisingColumbia .docxTERRORIST RISING3Terrorist RisingColumbia .docx
TERRORIST RISING3Terrorist RisingColumbia .docx
 
Test one, sp12TrueFalseIndicate whether the statement is true o.docx
Test one, sp12TrueFalseIndicate whether the statement is true o.docxTest one, sp12TrueFalseIndicate whether the statement is true o.docx
Test one, sp12TrueFalseIndicate whether the statement is true o.docx
 
Terrorism       In the workplaceSubmit a document in the fo.docx
Terrorism       In the workplaceSubmit a document in the fo.docxTerrorism       In the workplaceSubmit a document in the fo.docx
Terrorism       In the workplaceSubmit a document in the fo.docx
 
Test one, sp12 TrueFalse Indicate whether the statement is true or .docx
Test one, sp12 TrueFalse Indicate whether the statement is true or .docxTest one, sp12 TrueFalse Indicate whether the statement is true or .docx
Test one, sp12 TrueFalse Indicate whether the statement is true or .docx
 
Terrorism       In the workplaceSubmit a document in the format.docx
Terrorism       In the workplaceSubmit a document in the format.docxTerrorism       In the workplaceSubmit a document in the format.docx
Terrorism       In the workplaceSubmit a document in the format.docx
 
Terrorist Group HamasThe student is expected to do in-depth res.docx
Terrorist Group HamasThe student is expected to do in-depth res.docxTerrorist Group HamasThe student is expected to do in-depth res.docx
Terrorist Group HamasThe student is expected to do in-depth res.docx
 
ter 5Making Judgments©2012 NBCUniversal Media, LLCNBCU Phot.docx
ter 5Making Judgments©2012 NBCUniversal Media, LLCNBCU Phot.docxter 5Making Judgments©2012 NBCUniversal Media, LLCNBCU Phot.docx
ter 5Making Judgments©2012 NBCUniversal Media, LLCNBCU Phot.docx
 
Term Research Assignment FAQ’s This is an overview of ques.docx
Term Research Assignment FAQ’s This is an overview of ques.docxTerm Research Assignment FAQ’s This is an overview of ques.docx
Term Research Assignment FAQ’s This is an overview of ques.docx
 
TERM PROJECT ALTERNATIVE PLANS CHOOSE A PLAN SUPP.docx
TERM PROJECT ALTERNATIVE PLANS CHOOSE A PLAN SUPP.docxTERM PROJECT ALTERNATIVE PLANS CHOOSE A PLAN SUPP.docx
TERM PROJECT ALTERNATIVE PLANS CHOOSE A PLAN SUPP.docx
 
Test Module 3 Knowledge CheckQUESTION 1A 45-year-.docx
Test Module 3 Knowledge CheckQUESTION 1A 45-year-.docxTest Module 3 Knowledge CheckQUESTION 1A 45-year-.docx
Test Module 3 Knowledge CheckQUESTION 1A 45-year-.docx
 
Test is 25 minutes10 to 20 questionsThis timed quiz features.docx
Test is 25 minutes10 to 20 questionsThis timed quiz features.docxTest is 25 minutes10 to 20 questionsThis timed quiz features.docx
Test is 25 minutes10 to 20 questionsThis timed quiz features.docx
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 

Testing Access ControlDiscuss the purpose of the security de.docx

  • 1. "Testing Access Control" Discuss the purpose of the security development life cycle and how it is used for testing security systems. Using the Internet, find two to three tools that could be used to conduct a vulnerability assessment. Please include the web URL and share with your classmates. Are paid tools more effective than open- source tools? How does someone determine the best tool to use for an assessment? Justify your answers. Additional post options: Should a company conduct their own pentest or should they pay to have an outside company conduct the tests? Justify your answer.