throbber
ISSN 1945-5259
`
`ournal of Information Systems Technology and Planning
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Volume 5, Issue 12
`
`
`
`Published and Sponsored by: Intellectbase International Consortium (IIC)
`
`
`
`
`Blue Coat Systems - Exhibit 1042 Page 1
`
`

`
`Journal of Information Systems
`
`
`
`
`
`
`
`
`
`
`
`Technology & Planning
`
`Volume 5, Issue 12
`
`Editor-In-Chief
`
`Dr. Maurice E. Dawson Jr., Alabama A&M University, USA
`
`
`
`Contributing Editors
`
`Senior Advisory Board
`
`Dr. Khalid Alrawi, Associate Editor
`Al-Ain University of Science and Technology, UAE
`
`Dr. Jeffrey Siekpe, Associate Editor
`Tennessee State University, USA
`
`Dr. Frank Tsui, Associate Editor
`Southern Polytechnic State University, USA
`
`Mrs. Karina Dyer, Managing Editor
`Intellectbase International Consortium,
`Australian Affiliate
`
`Dr. Svetlana Peltsverger
`Southern Polytechnic State University, USA
`
`Dr. Kong-Cheng Wong
`Governors State University, USA
`
`Dr. Tehmina Khan
`RMIT University, Australia
`
`Dr. Sushil K. Misra
`Concordia University, Canada
`
`
`
`
`
`ISSN: 1945-5240 Print
`
`ISSN: 1945-5267 Online
`
`ISSN: 1945-5259 CD-ROM
`
`
`Copyright ©2012 Intellectbase International Consortium (IIC). Permission to make digital or hard copies of all or part of this journal for
`personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial use. All copies
`must bear this notice and full citation. Permission from the Editor is required to post to servers, redistribute to lists, or utilize in a for-profit
`or commercial use. Permission requests should be sent to Journal of Information Systems Technology & Planning (JISTP), 1615
`Seventh Avenue North, Nashville, TN, 37208.
`
`
`
`
`
`
`
`Blue Coat Systems - Exhibit 1042 Page 2
`
`

`
`
`
`J. D. Shorter, J. K. Smith and R. A. Aukerman
`
`JISTP - Volume 5, Issue 12 (2012), pp. 13-22
`
`
`
`
`
`Full Article Available Online at: Intellectbase and EBSCOhost │ JISTP is indexed with Cabell’s, JournalSeek, etc.
`
`JOURNAL OF INFORMATION SYSTEMS TECHNOLOGY & PLANNING
`
`Journal Homepage: www.intellectbase.org/journals.php │ ©2012 Published by Intellectbase International Consortium, USA
`
`
`
`
`ASPECTS OF INFORMATION SECURITY: PENETRATION TESTING IS
`CRUCIAL FOR MAINTAINING SYSTEM SECURITY VIABILITY
`
`Jack D. Shorter, James K. Smith and Richard A. Aukerman
`Texas A&M University - Kingsville, USA
`
`
`ABSTRACT
`
`P
`
`Penetration testing is the practice of testing computer systems, networks or web applications
`for their vulnerabilities and security weaknesses. These tests can either be conducted by
`automated software or manually [6.] Wikipedia has defined penetration testing as “a method
`of evaluating the security of a computer system or network by simulating an attack from a malicious
`source...” [11]. There are many different levels of penetration tests that can be performed on an
`organizations network and security infrastructure. These tests can range from simply attempting a brute
`force password attack on a particular system, all the way up to a simulated attack including, but not
`limited to social engineering.
`
`Keywords: Penetration Testing, Black Box Penetration Testing, White Box Penetration Testing,
`Scanning and Enumeration, Target Testing, Internal Testing, Blind Testing, Double Blind
`Testing.
`
`
`INTRODUCTION
`
`Penetration testing is the practice of testing computer systems, networks or web applications for their
`vulnerabilities and security weaknesses. These tests can either be conducted by automated software or
`manually. The objectives of these tests are to provide valuable security information to the company
`being tested, and to serve as a blueprint for the areas that need improvement. Besides security issues,
`penetration testing is also performed to monitor an “organization's security policy compliance, its
`employees' security awareness and the organization's ability to identify and respond to security
`incidents”. Penetration tests are sometimes referred to as “White Hat attacks” due to the break-ins
`being conducted by information systems personnel who were ask to supply this service [6].
`
`There are countless guides, books, and resources available for the modern network administrator or
`information technology executive to facilitate making the sensitive data on their networks and computer
`systems secure. He or she can have a highly secure network by having a robust Acceptable Use Policy
`(AUP), Security Policy (SP), along with well trained staff in both the information technology department
`and the organization as a whole. The data on the computers within the network can be protected by the
`most expensive up-to-date firewalls and encryption methods. The equipment can be physically
`protected by video monitoring, multiple security guards, and locked doors that lead to man-trap
`hallways. When all of this security is in place, how can a network administrator be confident that the
`
`
`13
`
`Blue Coat Systems - Exhibit 1042 Page 3

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket