{"title":"工程生命周期支持渗透测试和网络操作","authors":"Paul G. Cheney, Ian R. McAndrew","doi":"10.5121/ijmit.2021.13403","DOIUrl":null,"url":null,"abstract":"This paper discusses the strengths and weaknesses of proper engineering and life cycle management on higher level cyber security operations. Rushing innovation and increasing profits undermines the foundations need to operate and create secure stability in IT based companies. This research argues how it must be considered and how effective engineering processes greatly add to security even post implementation.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Engineering Life Cycle Enables Penetration Testing and Cyber Operations\",\"authors\":\"Paul G. Cheney, Ian R. McAndrew\",\"doi\":\"10.5121/ijmit.2021.13403\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper discusses the strengths and weaknesses of proper engineering and life cycle management on higher level cyber security operations. Rushing innovation and increasing profits undermines the foundations need to operate and create secure stability in IT based companies. This research argues how it must be considered and how effective engineering processes greatly add to security even post implementation.\",\"PeriodicalId\":335930,\"journal\":{\"name\":\"International Journal of Managing Information Technology\",\"volume\":\"67 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Managing Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5121/ijmit.2021.13403\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Managing Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/ijmit.2021.13403","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Engineering Life Cycle Enables Penetration Testing and Cyber Operations
This paper discusses the strengths and weaknesses of proper engineering and life cycle management on higher level cyber security operations. Rushing innovation and increasing profits undermines the foundations need to operate and create secure stability in IT based companies. This research argues how it must be considered and how effective engineering processes greatly add to security even post implementation.