APA format 2-3 pages
Consider that an individual threat agent, such as a hacker, can be a factor in more than one threat category. If a hacker breaks into a network, copies a few files, defaces a web page, and steals credit card numbers, how many different threat categories does the attack fall into?
What are the three penetration-testing methodologies? Which methodology would you use if you owned a business and were hiring a firm to ensure your network was secure?
In addition to a text description, you may add a screen capture, a matrix, or other creative image that supports your ideas.