ambersail489
Joined: 12 Jul 2013 Posts: 5
|
Posted: Fri Jul 12, 2013 6:03 am Post subject: Active evaluation on the program |
|
|
The approach entails an active evaluation on the program for any potential vulnerabilities that could result from poor or improper system configuration, each identified and unknown hardware or computer software flaws, or operational weaknesses in method or technical countermeasures. This evaluation is carried out in the position of a prospective attacker and can involve active exploitation of security vulnerabilities. _________________ web application penetration test |
|