Fig 4 - uploaded by Nusrat Zahan
Content may be subject to copyright.
Exploratory Penetration Testing Efficiency 41

Exploratory Penetration Testing Efficiency 41

Source publication
Preprint
Full-text available
Lack of security expertise among software practitioners is a problem with many implications. First, there is a deficit of security professionals to meet current needs. Additionally, even practitioners who do not plan to work in security may benefit from increased understanding of security. The goal of this paper is to aid software engineering educa...

Contexts in source publication

Context 1
... students were currently taking a course in security or privacy in addition to the course from which the data was collected (Q4). Figure 4 shows student efficiencies as a boxplot. The data shown in Figure 4 has been trimmed [33], [34], using the median absolute deviation and median (MADN) to identify the most extreme outlier for each technique. ...
Context 2
... 4 shows student efficiencies as a boxplot. The data shown in Figure 4 has been trimmed [33], [34], using the median absolute deviation and median (MADN) to identify the most extreme outlier for each technique. The most extreme outlier for each technique was then removed from the dataset. ...
Context 3
... shown in Figure 4, for the last assignment students were relatively efficient in using exploratory penetration testing to find vulnerabilities. Exploratory testing is highlighted in dark blue. ...
Context 4
... students were currently taking a course in security or privacy in addition to the course from which the data was collected (Q4). Figure 4 shows student efficiencies as a boxplot. The data shown in Figure 4 has been trimmed [33], [34], using the median absolute deviation and median (MADN) to identify the most extreme outlier for each technique. ...
Context 5
... 4 shows student efficiencies as a boxplot. The data shown in Figure 4 has been trimmed [33], [34], using the median absolute deviation and median (MADN) to identify the most extreme outlier for each technique. The most extreme outlier for each technique was then removed from the dataset. ...
Context 6
... shown in Figure 4, for the last assignment students were relatively efficient in using exploratory penetration testing to find vulnerabilities. Exploratory testing is highlighted in dark blue. ...

Similar publications

Article
Full-text available
Data confidentiality has emerged as the prime concern in securing applications across the web. The hackers look for loopholes in the data integrity so that it could be broken and the confidential data could be stolen. Thus, the most preferred way to prevent web applications from revealing the data confidentiality is by scanning and eliminating thos...